CVE-2026-27179: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in sergejey MajorDoMo
MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitization or parameterized queries. The commands module is loadable without authentication via the /objects/?module=commands endpoint, which includes arbitrary modules by name and calls their usual() method. Time-based blind SQL injection is exploitable using UNION SELECT SLEEP() syntax. Because MajorDoMo stores admin passwords as unsalted MD5 hashes in the users table, successful exploitation enables extraction of credentials and subsequent admin panel access.
AI Analysis
Technical Summary
CVE-2026-27179 identifies a critical SQL injection vulnerability in the MajorDoMo home automation platform developed by sergejey. The vulnerability resides in the commands module, specifically in the commands_search.inc.php file, where the 'parent' parameter from HTTP GET requests is directly embedded into multiple SQL queries without any input validation, sanitization, or use of parameterized queries. This improper neutralization of special elements allows attackers to inject arbitrary SQL code. The commands module can be loaded without authentication via the /objects/?module=commands endpoint, which dynamically includes modules by name and invokes their usual() method, exposing the vulnerable code to unauthenticated users. Attackers can exploit this flaw using time-based blind SQL injection techniques, such as UNION SELECT SLEEP(), to infer data from the database. Because MajorDoMo stores administrator passwords as unsalted MD5 hashes in the users table, attackers can extract these hashes and perform offline cracking to obtain admin credentials. Successful exploitation grants full administrative access to the platform, enabling attackers to manipulate home automation controls, access sensitive data, or pivot further into the network. The vulnerability affects all versions of MajorDoMo (version 0 listed), and no patches or official fixes are currently available. The CVSS 4.0 score of 8.8 reflects the vulnerability's ease of exploitation (no authentication or user interaction required), high impact on confidentiality and integrity, and broad scope of affected systems. Although no known exploits have been reported in the wild yet, the vulnerability poses a significant threat to any deployment of MajorDoMo.
Potential Impact
For European organizations using MajorDoMo, this vulnerability presents a severe risk to the confidentiality, integrity, and availability of their home automation systems. Exploitation can lead to unauthorized disclosure of sensitive data, including administrator credentials, enabling attackers to gain full control over the platform. This could result in manipulation of connected devices, disruption of automated processes, and potential privacy violations. In environments where MajorDoMo controls critical infrastructure or safety systems (e.g., smart buildings, healthcare facilities, or industrial automation), the impact could extend to physical safety risks and operational downtime. The lack of authentication requirement and the ability to exploit remotely increase the likelihood of attacks, especially in organizations with externally accessible MajorDoMo instances. Additionally, the use of weak password hashing (unsalted MD5) exacerbates the risk by facilitating credential compromise. European entities relying on MajorDoMo for smart home or building automation should consider this vulnerability a critical threat to their cybersecurity posture.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict external network access to the MajorDoMo platform by enforcing strict firewall rules and network segmentation to limit exposure to untrusted networks. Disable or restrict access to the vulnerable commands module endpoint (/objects/?module=commands) if possible. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns, particularly those involving the 'parent' parameter and time-based injection techniques. Conduct a thorough audit of user credentials and enforce password resets with strong, salted hashing algorithms to replace unsalted MD5 hashes. Monitor logs for unusual SQL query patterns or repeated requests to the vulnerable endpoint. If feasible, deploy intrusion detection systems tuned to detect SQL injection attempts. Engage with the vendor or community to obtain or develop patches or updates that properly sanitize inputs and implement parameterized queries. Finally, educate administrators on the risks and ensure regular backups are maintained to enable recovery in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2026-27179: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in sergejey MajorDoMo
Description
MajorDoMo (aka Major Domestic Module) contains an unauthenticated SQL injection vulnerability in the commands module. The commands_search.inc.php file directly interpolates the $_GET['parent'] parameter into multiple SQL queries without sanitization or parameterized queries. The commands module is loadable without authentication via the /objects/?module=commands endpoint, which includes arbitrary modules by name and calls their usual() method. Time-based blind SQL injection is exploitable using UNION SELECT SLEEP() syntax. Because MajorDoMo stores admin passwords as unsalted MD5 hashes in the users table, successful exploitation enables extraction of credentials and subsequent admin panel access.
AI-Powered Analysis
Technical Analysis
CVE-2026-27179 identifies a critical SQL injection vulnerability in the MajorDoMo home automation platform developed by sergejey. The vulnerability resides in the commands module, specifically in the commands_search.inc.php file, where the 'parent' parameter from HTTP GET requests is directly embedded into multiple SQL queries without any input validation, sanitization, or use of parameterized queries. This improper neutralization of special elements allows attackers to inject arbitrary SQL code. The commands module can be loaded without authentication via the /objects/?module=commands endpoint, which dynamically includes modules by name and invokes their usual() method, exposing the vulnerable code to unauthenticated users. Attackers can exploit this flaw using time-based blind SQL injection techniques, such as UNION SELECT SLEEP(), to infer data from the database. Because MajorDoMo stores administrator passwords as unsalted MD5 hashes in the users table, attackers can extract these hashes and perform offline cracking to obtain admin credentials. Successful exploitation grants full administrative access to the platform, enabling attackers to manipulate home automation controls, access sensitive data, or pivot further into the network. The vulnerability affects all versions of MajorDoMo (version 0 listed), and no patches or official fixes are currently available. The CVSS 4.0 score of 8.8 reflects the vulnerability's ease of exploitation (no authentication or user interaction required), high impact on confidentiality and integrity, and broad scope of affected systems. Although no known exploits have been reported in the wild yet, the vulnerability poses a significant threat to any deployment of MajorDoMo.
Potential Impact
For European organizations using MajorDoMo, this vulnerability presents a severe risk to the confidentiality, integrity, and availability of their home automation systems. Exploitation can lead to unauthorized disclosure of sensitive data, including administrator credentials, enabling attackers to gain full control over the platform. This could result in manipulation of connected devices, disruption of automated processes, and potential privacy violations. In environments where MajorDoMo controls critical infrastructure or safety systems (e.g., smart buildings, healthcare facilities, or industrial automation), the impact could extend to physical safety risks and operational downtime. The lack of authentication requirement and the ability to exploit remotely increase the likelihood of attacks, especially in organizations with externally accessible MajorDoMo instances. Additionally, the use of weak password hashing (unsalted MD5) exacerbates the risk by facilitating credential compromise. European entities relying on MajorDoMo for smart home or building automation should consider this vulnerability a critical threat to their cybersecurity posture.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls. First, restrict external network access to the MajorDoMo platform by enforcing strict firewall rules and network segmentation to limit exposure to untrusted networks. Disable or restrict access to the vulnerable commands module endpoint (/objects/?module=commands) if possible. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns, particularly those involving the 'parent' parameter and time-based injection techniques. Conduct a thorough audit of user credentials and enforce password resets with strong, salted hashing algorithms to replace unsalted MD5 hashes. Monitor logs for unusual SQL query patterns or repeated requests to the vulnerable endpoint. If feasible, deploy intrusion detection systems tuned to detect SQL injection attempts. Engage with the vendor or community to obtain or develop patches or updates that properly sanitize inputs and implement parameterized queries. Finally, educate administrators on the risks and ensure regular backups are maintained to enable recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-02-18T15:22:30.053Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69962e786aea4a407ae92203
Added to database: 2/18/2026, 9:26:16 PM
Last enriched: 2/18/2026, 9:41:30 PM
Last updated: 2/21/2026, 12:18:50 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.