CVE-2026-23885: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AlchemyCMS alchemy_cms
CVE-2026-23885 is a medium severity vulnerability in AlchemyCMS versions prior to 7. 4. 12 and between 8. 0. 0 and 8. 0. 3, caused by improper neutralization of directives in dynamically evaluated code (Eval Injection). The vulnerability arises from the use of Ruby's eval() function on the resource_handler. engine_name attribute, which can be influenced by authenticated administrators. This allows an attacker with administrative privileges to execute arbitrary system commands on the host OS, potentially compromising confidentiality, integrity, and availability.
AI Analysis
Technical Summary
CVE-2026-23885 is an Eval Injection vulnerability classified under CWE-95 affecting the AlchemyCMS open-source content management system written in Ruby on Rails. The vulnerability exists in versions prior to 7.4.12 and between 8.0.0 and 8.0.3 due to unsafe use of Ruby's eval() function in the method Alchemy::ResourcesHelper#resource_url_proxy, specifically at line 28 in app/helpers/alchemy/resources_helper.rb. The eval() function dynamically executes a string derived from the resource_handler.engine_name attribute, which is sourced from module definitions that can be influenced by administrative configurations. Despite the presence of a rubocop directive disabling security linting for eval, no proper sanitization or mitigation was implemented. An authenticated attacker with administrative privileges can manipulate engine_name to escape the Ruby sandbox and execute arbitrary system commands on the host operating system. This leads to full compromise of the affected server, impacting confidentiality, integrity, and availability. The vulnerability has a CVSS 3.1 base score of 6.6, reflecting medium severity, with attack vector network, high attack complexity, required privileges high, no user interaction, and impacts on confidentiality, integrity, and availability. The issue is resolved in versions 7.4.12 and 8.0.3 by replacing eval() with the safer send() method, which does not evaluate arbitrary code but calls methods by name, mitigating the injection risk. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, exploitation of CVE-2026-23885 could lead to complete system compromise of servers running vulnerable versions of AlchemyCMS. Given that the vulnerability requires administrative privileges, the initial access vector is limited to insiders or attackers who have already breached lower-level defenses. However, once exploited, attackers can execute arbitrary commands, potentially leading to data theft, service disruption, or pivoting within the network. This is particularly concerning for organizations managing sensitive content or critical infrastructure websites using AlchemyCMS. The impact extends to confidentiality breaches, integrity violations through unauthorized content modification, and availability disruptions via system command execution. The medium severity rating reflects the balance between the high impact of exploitation and the requirement for high privileges and no user interaction. European entities with public-facing CMS deployments or multi-tenant hosting environments are at elevated risk, especially if patching is delayed or administrative access controls are weak.
Mitigation Recommendations
European organizations should immediately upgrade AlchemyCMS to versions 7.4.12 or 8.0.3 or later to eliminate the vulnerability. In addition to patching, organizations must audit administrative access controls to ensure that only trusted personnel have configuration privileges that influence engine_name or similar attributes. Implement strict role-based access control (RBAC) and monitor administrative actions for suspicious changes. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with custom rules to detect and block anomalous command execution patterns. Regularly review and sanitize all inputs that could influence dynamic code execution paths, even if not directly related to this vulnerability. Conduct security code reviews focusing on the use of dangerous functions like eval() and replace them with safer alternatives such as send() or explicit method calls. Finally, maintain comprehensive logging and alerting on administrative operations and system command executions to enable rapid detection and response to exploitation attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Belgium, Italy
CVE-2026-23885: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AlchemyCMS alchemy_cms
Description
CVE-2026-23885 is a medium severity vulnerability in AlchemyCMS versions prior to 7. 4. 12 and between 8. 0. 0 and 8. 0. 3, caused by improper neutralization of directives in dynamically evaluated code (Eval Injection). The vulnerability arises from the use of Ruby's eval() function on the resource_handler. engine_name attribute, which can be influenced by authenticated administrators. This allows an attacker with administrative privileges to execute arbitrary system commands on the host OS, potentially compromising confidentiality, integrity, and availability.
AI-Powered Analysis
Technical Analysis
CVE-2026-23885 is an Eval Injection vulnerability classified under CWE-95 affecting the AlchemyCMS open-source content management system written in Ruby on Rails. The vulnerability exists in versions prior to 7.4.12 and between 8.0.0 and 8.0.3 due to unsafe use of Ruby's eval() function in the method Alchemy::ResourcesHelper#resource_url_proxy, specifically at line 28 in app/helpers/alchemy/resources_helper.rb. The eval() function dynamically executes a string derived from the resource_handler.engine_name attribute, which is sourced from module definitions that can be influenced by administrative configurations. Despite the presence of a rubocop directive disabling security linting for eval, no proper sanitization or mitigation was implemented. An authenticated attacker with administrative privileges can manipulate engine_name to escape the Ruby sandbox and execute arbitrary system commands on the host operating system. This leads to full compromise of the affected server, impacting confidentiality, integrity, and availability. The vulnerability has a CVSS 3.1 base score of 6.6, reflecting medium severity, with attack vector network, high attack complexity, required privileges high, no user interaction, and impacts on confidentiality, integrity, and availability. The issue is resolved in versions 7.4.12 and 8.0.3 by replacing eval() with the safer send() method, which does not evaluate arbitrary code but calls methods by name, mitigating the injection risk. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, exploitation of CVE-2026-23885 could lead to complete system compromise of servers running vulnerable versions of AlchemyCMS. Given that the vulnerability requires administrative privileges, the initial access vector is limited to insiders or attackers who have already breached lower-level defenses. However, once exploited, attackers can execute arbitrary commands, potentially leading to data theft, service disruption, or pivoting within the network. This is particularly concerning for organizations managing sensitive content or critical infrastructure websites using AlchemyCMS. The impact extends to confidentiality breaches, integrity violations through unauthorized content modification, and availability disruptions via system command execution. The medium severity rating reflects the balance between the high impact of exploitation and the requirement for high privileges and no user interaction. European entities with public-facing CMS deployments or multi-tenant hosting environments are at elevated risk, especially if patching is delayed or administrative access controls are weak.
Mitigation Recommendations
European organizations should immediately upgrade AlchemyCMS to versions 7.4.12 or 8.0.3 or later to eliminate the vulnerability. In addition to patching, organizations must audit administrative access controls to ensure that only trusted personnel have configuration privileges that influence engine_name or similar attributes. Implement strict role-based access control (RBAC) and monitor administrative actions for suspicious changes. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) with custom rules to detect and block anomalous command execution patterns. Regularly review and sanitize all inputs that could influence dynamic code execution paths, even if not directly related to this vulnerability. Conduct security code reviews focusing on the use of dangerous functions like eval() and replace them with safer alternatives such as send() or explicit method calls. Finally, maintain comprehensive logging and alerting on administrative operations and system command executions to enable rapid detection and response to exploitation attempts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-16T21:02:02.901Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696ea0384623b1157ccf2ce8
Added to database: 1/19/2026, 9:20:56 PM
Last enriched: 1/19/2026, 9:35:31 PM
Last updated: 1/19/2026, 11:01:23 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1179: SQL Injection in Yonyou KSOA
MediumCVE-2026-1177: SQL Injection in Yonyou KSOA
MediumCVE-2026-23944: CWE-306: Missing Authentication for Critical Function in getarcaneapp arcane
HighCVE-2026-23880: CWE-20: Improper Input Validation in HackUCF OnboardLite
HighCVE-2026-23877: CWE-25: Path Traversal: '/../filedir' in swingmx swingmusic
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.