QID 730870

Date Published: 2023-08-23

QID 730870: Movable Type XMLRPC API Remote Command Injection Vulnerability

Movable Type is vulnerable to Remote Command Injection Vulnerability through the XMLRPC API of MT (mt-xmlrpc.cgi). This issue may occur when mt-xmlrpc.cgi can be executed on the Internet.

Affected Versions:
Movable Type 7 r.5002 and earlier (Movable Type 7 Series)
Movable Type 6.8.2 and earlier (Movable Type 6 Series)
Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series)
Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series)
Movable Type Premium 1.46 and earlier
Movable Type Premium Advanced 1.46 and earlier

QID Detection Logic (Unauthenticated):
This QID checks for vulnerable version of Movable Type by sending a GET request to '/cgi-bin/mt/mt.cgi/' and 'mt/admin' endpoint and checks the version received in the response.

Successful exploitation of the vulnerability may lead to remote code execution and total system compromise.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Vendor has released patch, for more information please refer to Movable Type Security Advisory

    Vendor References

    CVEs related to QID 730870

    Software Advisories
    Advisory ID Software Component Link
    Movable Type Security Advisory URL Logo movabletype.org/news/2021/10/mt-782-683-released.html