Vulnerability Description
CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. Attackers can exploit the ServerMapPath() function by renaming uploaded HTML files using directory traversal sequences to write files outside the intended template directory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Phphtmledit | Rich Text Editor | <= 6.6 |
Related Weaknesses (CWE)
References
- http://phphtmledit.com/Product
- https://www.exploit-db.com/exploits/50994Exploit
- https://www.vulncheck.com/advisories/cuteeditor-for-php-directory-traversalThird Party Advisory
- https://www.exploit-db.com/exploits/50994Exploit
FAQ
What is CVE-2021-47751?
CVE-2021-47751 is a vulnerability with a CVSS score of 7.5 (HIGH). CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root dire...
How severe is CVE-2021-47751?
CVE-2021-47751 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-47751?
Check the references section above for vendor advisories and patch information. Affected products include: Phphtmledit Rich Text Editor.