CVE-2026-27180

CRITICAL

CVSS v3

9.8

CRITICAL

EPSS Score

48.8%

exploit probability

CISA KEV

No

known exploited

Exploitation

SSVC status

Description

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method through the /objects/?module=saverestore endpoint without authentication because it uses gr('mode') (which reads directly from $_REQUEST) instead of the framework's $this->mode. An attacker can poison the system update URL via the auto_update_settings mode handler, then trigger the force_update han

Technical Details

CVSS v3 Vector
3.1
Published
2/18/2026
Last Modified
2/20/2026

Frequently Asked Questions

What is CVE-2026-27180?

MajorDoMo (aka Major Domestic Module) is vulnerable to unauthenticated remote code execution through supply chain compromise via update URL poisoning. The saverestore module exposes its admin() method through the /objects/?module=saverestore endpoint without authentication because it uses gr('mode') (which reads directly from $_REQUEST) instead of the framework's $this->mode. An attacker can poison the system update URL via the auto_update_settings mode handler, then trigger the force_update han

Is CVE-2026-27180 actively exploited?

Active exploitation of CVE-2026-27180 has not been confirmed. The EPSS score is 48.8%, indicating the estimated probability of exploitation in the next 30 days.

What is the CVSS score for CVE-2026-27180?

CVE-2026-27180 has a CVSS v3 base score of 9.8 (CRITICAL severity), with vector string 3.1.

Is CVE-2026-27180 affecting your environment?

Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.