MetInfo CMS CVE-2026-29014 Exploited for RCE Attacks
Threat actors are actively exploiting a critical vulnerability, CVE-2026-29014 (CVSS 9.8), impacting the open-source content management system (CMS) MetInfo. According to findings from The Hacker News, citing VulnCheck, this is an unauthenticated PHP code injection flaw present in MetInfo CMS versions 7.9, 8.0, and 8.1. The severity of this flaw means it can lead directly to arbitrary code execution, granting attackers full control over compromised systems.
This is a stark reminder that even seemingly niche open-source platforms are not immune from targeted exploitation. The attacker’s calculus here is straightforward: find unpatched, internet-facing instances and gain immediate remote code execution. For defenders, this means any MetInfo CMS instance, especially older versions, is a high-value target that needs immediate attention.
SCW advises organizations using MetInfo CMS to prioritize patching and verify system integrity. Given the active exploitation, assume compromise until proven otherwise. This isn’t theoretical; it’s a live threat demanding urgent action.
What This Means For You
- If your organization uses MetInfo CMS, immediately identify all instances, especially versions 7.9, 8.0, and 8.1. Prioritize patching for CVE-2026-29014 and conduct a thorough audit for any signs of compromise, including unauthorized files or suspicious activity in web server logs.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
MetInfo CMS PHP Code Injection (CVE-2026-29014)
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-29014 | RCE | MetInfo CMS versions 7.9, 8.0, 8.1 |
| CVE-2026-29014 | Code Injection | unauthenticated PHP code injection |