Lucene search

K

CVE-2021-21425

🗓️ 07 Apr 2021 19:12:15Reported by GitHub_MType 
cve
 cve
🔗 web.nvd.nist.gov📰️ 10 Media mentions👁 103 Views🌐 WEB

Grav Admin Plugin HTML UI allows unauthenticated user to execute administrator controller methods, leading to arbitrary YAML file creation or content change. Fixed in v1.10.8

Show more

5 of 5AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Detection
Affected
Refs
Paths
Social
Nvd
Vulners
Node
[
  {
    "product": "grav-plugin-admin",
    "vendor": "getgrav",
    "versions": [
      {
        "status": "affected",
        "version": "<= 1.10.7"
      }
    ]
  }
]
ParameterPositionPathDescriptionCWE
admin-noncepath/admin/config/schedulerPOST request to scheduler allows exploitation for command execution.CWE-284
data[custom_jobs]path/admin/config/schedulerPOST request to scheduler allows exploitation for command execution.CWE-284
data[status]path/admin/config/schedulerPOST request to scheduler allows exploitation for command execution.CWE-284

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
07 Apr 2021 19:15Current
9.4High risk
Vulners AI Score9.4
CVSS27.5
CVSS39.3 - 9.8
EPSS0.89
103
.json
Report