Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 17 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:openbmcs:openbmcs:2.4:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 10 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openbmcs
Openbmcs openbmcs |
|
| Vendors & Products |
Openbmcs
Openbmcs openbmcs |
Tue, 09 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 09 Dec 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenBMCS 2.4 allows an attacker to escalate privileges from a read user to an admin user by manipulating permissions and exploiting a vulnerability in the update_user_permissions.php script. Attackers can submit a malicious HTTP POST request to PHP scripts in '/plugins/useradmin/' directory. | |
| Title | OpenBMCS User Management Privilege Escalation | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:05:28.535Z
Reserved: 2025-12-05T19:10:29.044Z
Link: CVE-2021-47701
Updated: 2025-12-09T21:31:18.463Z
Status : Analyzed
Published: 2025-12-09T21:15:47.860
Modified: 2025-12-17T14:14:10.987
Link: CVE-2021-47701
No data.
OpenCVE Enrichment
Updated: 2025-12-10T21:33:26Z