Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 24 Jan 2026 07:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 24 Jan 2026 02:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Textpattern versions prior to 4.8.3 contain an authenticated remote code execution vulnerability that allows logged-in users to upload malicious PHP files. Attackers can upload a PHP file with a shell command execution payload and execute arbitrary commands by accessing the uploaded file through a specific URL parameter. | |
| Title | Textpattern 4.8.3 - Remote code execution | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-23T21:49:56.478Z
Reserved: 2026-01-18T12:35:05.173Z
Link: CVE-2021-47888
Updated: 2026-01-23T21:08:34.145Z
Status : Received
Published: 2026-01-23T17:15:51.930
Modified: 2026-01-23T22:16:08.497
Link: CVE-2021-47888
No data.
OpenCVE Enrichment
No data.