Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-34675 | An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request. |
| Link | Providers |
|---|---|
| https://projectblack.io/blog/zendto-nday-vulnerabilities/ |
|
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 07 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 05 Apr 2025 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-78 | |
| Metrics |
cvssV3_1
|
Sat, 05 Apr 2025 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-04-07T16:22:26.249Z
Reserved: 2025-04-05T00:00:00.000Z
Link: CVE-2021-47667
Updated: 2025-04-07T16:22:16.500Z
Status : Deferred
Published: 2025-04-05T05:15:43.223
Modified: 2026-04-15T00:35:42.020
Link: CVE-2021-47667
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:01:02Z
EUVD