. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 17 May 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sanluan
Sanluan publiccms |
|
| Vendors & Products |
Sanluan
Sanluan publiccms |
Sun, 17 May 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in Sanluan PublicCMS 5.202506.d. The affected element is the function getSignKey of the file publiccms-core/src/main/java/com/publiccms/logic/component/config/SafeConfigComponent.java. The manipulation of the argument privatefile_key results in use of hard-coded cryptographic key . The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Sanluan PublicCMS SafeConfigComponent.java getSignKey hard-coded key | |
| First Time appeared |
Publiccms
Publiccms publiccms |
|
| Weaknesses | CWE-320 CWE-321 |
|
| CPEs | cpe:2.3:a:publiccms:publiccms:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Publiccms
Publiccms publiccms |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-17T07:45:12.075Z
Reserved: 2026-05-16T10:36:27.832Z
Link: CVE-2026-8739
No data.
Status : Received
Published: 2026-05-17T08:16:23.107
Modified: 2026-05-17T08:16:23.107
Link: CVE-2026-8739
No data.
OpenCVE Enrichment
Updated: 2026-05-17T10:00:11Z