{"api_version":"1","generated_at":"2026-04-23T01:31:32+00:00","cve":"CVE-2018-5782","urls":{"html":"https://cve.report/CVE-2018-5782","api":"https://cve.report/api/cve/CVE-2018-5782.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-5782","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-5782"},"summary":{"title":"CVE-2018-5782","description":"A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vsethost.php page. Successful exploit could allow an attacker to execute arbitrary PHP code within the context of the application.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2018-03-14 16:29:00","updated_at":"2019-04-26 15:05:00"},"problem_types":["CWE-94"],"metrics":[],"references":[{"url":"https://github.com/twosevenzero/shoretel-mitel-rce","name":"https://github.com/twosevenzero/shoretel-mitel-rce","refsource":"MISC","tags":["Product","Third Party Advisory"],"title":"GitHub - twosevenzero/shoretel-mitel-rce: Remote Code Execution on ShoreTel/Mitel CONNECT Onsite ST 14.2","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004","name":"https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Mitel Product Security Advisory 18-0004","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/46174/","name":"46174","refsource":"EXPLOIT-DB","tags":["Exploit","Third Party Advisory","VDB Entry"],"title":"ShoreTel / Mitel Connect ONSITE 19.49.5200.0 - Remote Code Execution - PHP webapps Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-5782","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-5782","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"5782","vulnerable":"1","versionEndIncluding":"r1711-prem","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"connect_onsite","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"5782","vulnerable":"1","versionEndIncluding":"ga28","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mitel","cpe5":"st14.2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2018-5782","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vsethost.php page. Successful exploit could allow an attacker to execute arbitrary PHP code within the context of the application."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004","refsource":"CONFIRM","url":"https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-18-0004"},{"name":"46174","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/46174/"},{"refsource":"MISC","name":"https://github.com/twosevenzero/shoretel-mitel-rce","url":"https://github.com/twosevenzero/shoretel-mitel-rce"}]}},"nvd":{"publishedDate":"2018-03-14 16:29:00","lastModifiedDate":"2019-04-26 15:05:00","problem_types":["CWE-94"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":10},"severity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mitel:st14.2:*:*:*:*:*:*:*:*","versionEndIncluding":"ga28","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mitel:connect_onsite:*:*:*:*:*:*:*:*","versionEndIncluding":"r1711-prem","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"5782","Ordinal":"121780","Title":"CVE-2018-5782","CVE":"CVE-2018-5782","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"5782","Ordinal":"1","NoteData":"A vulnerability in the conferencing component of Mitel Connect ONSITE, versions R1711-PREM and earlier, and Mitel ST 14.2, release GA28 and earlier, could allow an unauthenticated attacker to inject PHP code using specially crafted requests to the vsethost.php page. Successful exploit could allow an attacker to execute arbitrary PHP code within the context of the application.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"5782","Ordinal":"2","NoteData":"2018-03-14","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"5782","Ordinal":"3","NoteData":"2019-04-24","Type":"Other","Title":"Modified"}]}}}