Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2021-27230
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-15 Mar, 2021 | 23:15
Updated At-12 Jul, 2022 | 17:42

ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.8HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary2.06.5MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
CPE Matches

expressionengine
expressionengine
>>expressionengine>>Versions before 5.4.2(exclusive)
cpe:2.3:a:expressionengine:expressionengine:*:*:*:*:*:*:*:*
expressionengine
expressionengine
>>expressionengine>>Versions from 6.0.0(inclusive) to 6.0.3(exclusive)
cpe:2.3:a:expressionengine:expressionengine:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-94Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://karmainsecurity.com/KIS-2021-03cve@mitre.org
Exploit
Third Party Advisory
http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.htmlcve@mitre.org
Exploit
Third Party Advisory
VDB Entry
http://seclists.org/fulldisclosure/2021/Mar/32cve@mitre.org
Mailing List
Third Party Advisory
https://expressionengine.com/featurescve@mitre.org
Vendor Advisory
https://hackerone.com/reports/1093444cve@mitre.org
Permissions Required
Third Party Advisory
Change History
0Changes found

Details not found