{"vulnerability": "CVE-2026-29014", "sightings": [{"uuid": "6d86fd79-c7d5-48d5-922f-fe02b5f75275", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3migyydiyl327", "content": "", "creation_timestamp": "2026-04-01T15:28:33.722980Z"}, {"uuid": "2af7161a-eaa1-4489-bcea-49f9ca80969b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mih4fyrdgh2w", "content": "", "creation_timestamp": "2026-04-01T16:29:53.985433Z"}, {"uuid": "2850c396-b201-4fad-b6e4-b6641771a1fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/thehackerwire.bsky.social/post/3mih4h2yr572w", "content": "", "creation_timestamp": "2026-04-01T16:30:30.329912Z"}, {"uuid": "b1c52e65-e0eb-4b15-92eb-d468b35c7f64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2026/CVE-2026-29014.yaml", "content": "", "creation_timestamp": "2026-04-06T03:05:00.000000Z"}, {"uuid": "e2d4a801-ad36-4379-8ea8-3348179ce41c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mkghdhlqwa2t", "content": "", "creation_timestamp": "2026-04-26T21:03:02.959857Z"}, {"uuid": "d69926b2-ebfe-40e6-b2e1-00fdc261464e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "Telegram/LPiyqtmOsuMBSJ4TiscGzigzJ0idlnzzivv75bN9d93RTXE", "content": "", "creation_timestamp": "2026-04-01T15:26:09.000000Z"}, {"uuid": "9fbff6aa-2801-492f-b776-05d123bb518b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3ml4amncfz227", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...", "creation_timestamp": "2026-05-05T13:01:29.846896Z"}, {"uuid": "bfa6e951-0382-424e-94a4-2475fc9abdc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/cybersecurity0001.bsky.social/post/3ml4buhm5762b", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks", "creation_timestamp": "2026-05-05T13:24:00.109792Z"}, {"uuid": "5770fd71-f4a0-43cc-8c1c-d3618509544c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3ml4bwabkpp2e", "content": "MetInfo CMS 7.9, 8.0, 8.1\u306b\u8a8d\u8a3c\u306a\u3057PHP\u30b3\u30fc\u30c9\u5b9f\u884c\u306e\u8106\u5f31\u6027\uff08CVE-2026-29014\uff09\u3042\u308a\u3002\u653b\u6483\u8005\u306f\u4efb\u610f\u30b3\u30fc\u30c9\u5b9f\u884c\u53ef\u80fd\u3002", "creation_timestamp": "2026-05-05T13:24:45.141531Z"}, {"uuid": "c1e7f7e8-814c-4c3a-8e3c-4e453df2e86c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116522561593846577", "content": "\ud83d\udcf0 Critical MetInfo CMS Vulnerability Under Active Exploitation\n\ud83d\udea8 ACTIVE EXPLOITATION! A critical RCE flaw (CVE-2026-29014, CVSS 9.8) in MetInfo CMS is being widely exploited. Unauthenticated attackers can gain full server control. Patch immediately! #CVE #RCE #CyberSecurity #Vulnerability\n\ud83d\udd17 https://cyber.netsecops.io", "creation_timestamp": "2026-05-05T15:00:09.467756Z"}, {"uuid": "7845a958-a9ff-422b-9ccc-b4611ab69fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml4ciibyrd2u", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks", "creation_timestamp": "2026-05-05T13:34:57.542346Z"}, {"uuid": "4f992073-8d25-4974-af96-74a0a7eccdc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2026-29014", "type": "seen", "source": "https://bsky.app/profile/montxt.bsky.social/post/3ml4d7mzeba2v", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks  https://thehackernews.com/2026/05/metinfo-cms-cve-2026-29014-exploited.html", "creation_timestamp": "2026-05-05T13:47:53.781982Z"}, {"uuid": "abd7468a-f611-4225-9c67-d562f4f69c3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://t.me/cibsecurity/89306", "content": "\ud83d\udd8b\ufe0f MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks \ud83d\udd8b\ufe0f\n\nThreat actors are actively exploiting a critical security flaw impacting an opensource content management system CMS known as MetInfo, according to new findings from VulnCheck. The vulnerability in question is CVE202629014 CVSS score 9.8, a code injection flaw that could result in arbitrary code execution. \"MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2026-05-05T13:00:12.000000Z"}, {"uuid": "473c7625-f08f-4043-9650-eae8016c8647", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://t.me/ctinow/249768", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks\nhttps://ift.tt/oO9uPZB", "creation_timestamp": "2026-05-05T12:59:52.000000Z"}, {"uuid": "d317f017-1d66-44a6-8bfe-f3945c96fc70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3ml4hb3sa4n2m", "content": "\ud83d\udea8 ACTIVE EXPLOITATION! A critical RCE flaw (CVE-2026-29014, CVSS 9.8) in MetInfo CMS is being widely exploited. Unauthenticated attackers can gain full server control. Patch immediately! #CVE #RCE #CyberSecurity #Vulnerability", "creation_timestamp": "2026-05-05T15:00:18.750475Z"}, {"uuid": "99d529aa-fb9a-47ec-8302-4d50a3fcbf70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://bsky.app/profile/bitnewsbot.bsky.social/post/3ml4imap35s26", "content": "Threat actors are actively exploiting CVE-2026-29014, a critical code injection flaw in MetInfo CMS. The vulnerability allows remote, unauthenticated attackers [\u2026]", "creation_timestamp": "2026-05-05T15:24:26.477979Z"}, {"uuid": "a897173c-2e1a-4481-8c83-96feafcffa24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://t.me/TengkorakCyberCrewzz/10152", "content": "MetInfo CMS CVE-2026-29014 Exploited for Remote Code Execution Attacks \u2013 thehackernews.com\n\nTue, 05 May 2026 19:56:00", "creation_timestamp": "2026-05-05T16:03:00.000000Z"}, {"uuid": "28a3d54f-f20b-4517-9d5d-14cce5571727", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://thehackernews.com/2026/05/metinfo-cms-cve-2026-29014-exploited.html", "content": "Threat actors are actively exploiting a critical security flaw impacting an open-source content management system (CMS) known as MetInfo, according to new findings from VulnCheck.\nThe vulnerability in question is CVE-2026-29014 (CVSS score: 9.8), a code injection flaw that could result in arbitrary code execution.\n\"MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code", "creation_timestamp": "2026-05-05T09:56:00.000000Z"}, {"uuid": "23f7ec49-6816-49d6-9b9a-e229ab446013", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2026-29014", "type": "seen", "source": "https://t.me/thehackernews/8935", "content": "\u26a0\ufe0f A critical MetInfo CMS flaw (CVE-2026-29014, CVSS 9.8) is under active exploitation, allowing unauthenticated remote code execution.\n\nAttacks began April 25 and surged by May 1, targeting exposed systems globally.\n\nDetails: https://thehackernews.com/2026/05/metinfo-cms-cve-2026-29014-exploited.html", "creation_timestamp": "2026-05-05T13:09:51.000000Z"}]}