CVE-2026-4562
Received Received - Intake
Authentication Bypass in MacCMS Timming API Endpoint Allows Remote Access

Publication date: 2026-03-23

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in MacCMS 2025.1000.4052. This affects an unknown part of the file application/api/controller/Timming.php of the component Timming API Endpoint. The manipulation results in missing authentication. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-23
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-03-23
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-4562 is a security flaw in MacCMS version 2025.1000.4052 affecting the Timming API Endpoint. The vulnerability arises because the API endpoint `api/Timming` allows execution of backend scheduled tasks without any authentication.

Specifically, the backend controller bypasses login checks when requests are made via the API entrance targeting the `Timming/index` path. This means an attacker can send unauthenticated requests to trigger scheduled tasks configured in the system.

The exploit requires that the site allows access to `api.php` and that at least one scheduled task is enabled. No administrator cookie or API token is needed to exploit this flaw.


How can this vulnerability impact me? :

This vulnerability allows an attacker to trigger backend scheduled tasks without authorization, which can lead to several security and operational impacts.

  • Unauthorized execution of scheduled tasks such as cache clearing or static page generation, potentially causing service disruption.
  • If scheduled tasks involve data collection or pushing URLs, attackers could cause server-side request forgery (SSRF), external network requests, or mass content injection.
  • Sensitive tasks could be abused to disrupt business operations or gain unauthorized access to remote resources.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for unauthenticated requests to the vulnerable API endpoint that trigger scheduled tasks. Specifically, look for GET requests to the path `/api.php/timming/index` with parameters such as `name` (the scheduled task name) and `enforce=1`.'}, {'type': 'paragraph', 'content': 'You can use network monitoring or web server logs to identify such suspicious requests.'}, {'type': 'list_item', 'content': 'Example command to detect exploitation attempts via web server logs (assuming Apache logs):'}, {'type': 'list_item', 'content': 'grep "/api.php/timming/index" /var/log/apache2/access.log | grep "enforce=1"'}, {'type': 'list_item', 'content': 'Using curl to test if the endpoint is accessible without authentication:'}, {'type': 'list_item', 'content': 'curl -v "http://<target-host>/api.php/timming/index?name=<task_name>&enforce=1"'}, {'type': 'paragraph', 'content': 'Replace `<target-host>` with your server address and `<task_name>` with the name of an enabled scheduled task (e.g., cache clearing). A successful response indicating task execution confirms the vulnerability.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include removing the authentication bypass in the backend controller handling the vulnerable API endpoint.

  • Remove or fix the bypass in `application/admin/controller/Base.php` that allows unauthenticated access to `api/Timming/index`.
  • Implement strong authentication mechanisms such as HMAC signatures, fixed source IP whitelisting, or high-entropy secret keys for accessing the scheduled task API.
  • Avoid exposing backend scheduled tasks directly via public APIs; instead, create a dedicated task execution layer with proper access controls.
  • Add permission checks for the `enforce=1` parameter to prevent forced execution of tasks by unauthorized users.
  • Enable logging of request sources, task names, and execution results for auditing and detection of suspicious activity.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart