CVE-2021-47943

high

Description

TextPattern CMS 4.8.7 contains a remote code execution vulnerability that allows authenticated attackers to execute arbitrary commands by uploading malicious PHP files through the file upload functionality. Attackers can upload a PHP shell via the Files section in the content area and execute commands by accessing the uploaded file at /textpattern/files/ with GET parameters passed to the system function.

References

https://www.vulncheck.com/advisories/textpattern-cms-remote-code-execution-via-file-upload

https://www.exploit-db.com/exploits/50415

https://www.exploit-db.com/exploits/49996

Details

Source: Mitre, NVD

Published: 2026-05-10

Updated: 2026-05-10

Risk Information

CVSS v2

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

Severity: High

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Severity: High