Vulnerability Description
Gila CMS versions prior to 2.0.0 contain a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through manipulated HTTP headers. Attackers can inject PHP code in the User-Agent header with shell_exec() to run system commands by sending crafted requests to the admin endpoint.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://gilacms.com/
- https://github.com/GilaCMS/gila
- https://www.exploit-db.com/exploits/49412
- https://www.vulncheck.com/advisories/gila-cms-remote-code-execution
FAQ
What is CVE-2021-47900?
CVE-2021-47900 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Gila CMS versions prior to 2.0.0 contain a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through manipulated HTTP headers. Attackers ca...
How severe is CVE-2021-47900?
CVE-2021-47900 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-47900?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.