Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 12 May 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | e107 CMS 2.3.0 contains a remote code execution vulnerability that allows authenticated users with theme installation permissions to execute arbitrary commands by uploading malicious theme files. Attackers can upload a crafted theme package through the theme.php endpoint that deploys a web shell to the e107_themes directory, then execute system commands via the payload.php script. | |
| Title | e107 CMS 2.3.0 Authenticated Remote Code Execution via Theme Upload | |
| First Time appeared |
E107
E107 e107 Cms |
|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:e107:e107_cms:2.3.0:*:*:*:*:*:*:* | |
| Vendors & Products |
E107
E107 e107 Cms |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-12T02:38:57.013Z
Reserved: 2026-02-01T11:24:18.717Z
Link: CVE-2021-47937
Updated: 2026-05-12T02:38:53.386Z
Status : Deferred
Published: 2026-05-10T13:16:29.960
Modified: 2026-05-12T14:24:15.210
Link: CVE-2021-47937
No data.
OpenCVE Enrichment
Updated: 2026-05-10T15:45:14Z