Connect-CMS has Arbitrary Code Execution by an Authenticated User in its Code Study Plugin
High severity
GitHub Reviewed
Published
Mar 23, 2026
in
opensource-workshop/connect-cms
•
Updated Mar 23, 2026
Package
Affected versions
< 1.41.1
>= 2.0.0, < 2.41.1
Patched versions
1.41.1
2.41.1
Description
Published to the GitHub Advisory Database
Mar 23, 2026
Reviewed
Mar 23, 2026
Last updated
Mar 23, 2026
Security Advisory — Code Study Plugin
Summary
An authenticated user may be able to execute arbitrary code in the Code Study Plugin.
Affected Versions
Patched Versions
Description
In the Code Study Plugin, an authenticated user could trigger unintended code execution. If exploited, it may lead to code execution on the server or information disclosure. Users affected by this vulnerability should update to a fixed version.
Solution
Update to the fixed version.
For the 1.x series, update to 1.41.1 or later.
For the 2.x series, update to 2.41.1 or later.
Credits
OpenSource WorkShop thanks Sho Odagiri (小田切 祥) of GMO Cybersecurity by Ierae, Inc. for reporting this vulnerability.
References