BoidCMS LFI to RCE: A Critical Template Flaw

BoidCMS LFI to RCE: A Critical Template Flaw

The National Vulnerability Database (NVD) recently detailed a critical vulnerability, CVE-2026-39387, affecting BoidCMS versions prior to 2.1.3. BoidCMS, an open-source, PHP-based flat-file CMS, is designed for simple websites and blogs, leveraging JSON for its data storage. This flaw exposes systems to a Local File Inclusion (LFI) attack via the tpl parameter, a vulnerability that can escalate directly to Remote Code Execution (RCE).

According to NVD, the core issue lies in inadequate sanitization of the tpl (template) parameter during page creation and updates. This parameter is passed directly into a require_once() statement without proper path validation. An authenticated administrator can exploit this by injecting path traversal sequences, like ../, into the tpl value. This allows them to escape the intended theme directory and include arbitrary files from the server, specifically files residing in the media/ directory.

The real kicker? When combined with the CMS’s file upload functionality, this LFI becomes a full-blown RCE chain. An attacker can first upload a file containing embedded PHP code—perhaps disguised as an image. Then, they use the path traversal trick to include that malicious file via require_once(), executing their code with the web server’s privileges. This is a nasty combo. NVD reports the issue has been patched in BoidCMS version 2.1.3, urging users to update immediately. The CVSS score for this vulnerability is 7.2 (HIGH).

Related ATT&CK Techniques

🛡️ Detection Rules

7 rules · 5 SIEM formats

7 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — CVE-2026-39387

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

7 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-39387 Local File Inclusion BoidCMS versions prior to 2.1.3
CVE-2026-39387 Local File Inclusion Vulnerable parameter: tpl
CVE-2026-39387 Local File Inclusion Vulnerable function: require_once() without path validation
CVE-2026-39387 RCE Exploitable via path traversal (../) in tpl parameter combined with file upload functionality

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs

Jellyfin RCE: Critical Flaw Chains Arbitrary File Write to Root

CVE-2026-35031 — Jellyfin is an open source self hosted media server. Versions prior to 10.11.7 contain a vulnerability chain in the subtitle upload endpoint (POST...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22cwe-187
/CRITICAL /⚑ 5 IOCs