Textpattern versions prior to 4.8.3 contain an authenticated remote code execution vulnerability that allows logged-in users to upload malicious PHP files. Attackers can upload a PHP file with a shell command execution payload and execute arbitrary commands by accessing the uploaded file through a specific URL parameter.
Metrics
Affected Vendors & Products
References
History
Fri, 23 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Textpattern versions prior to 4.8.3 contain an authenticated remote code execution vulnerability that allows logged-in users to upload malicious PHP files. Attackers can upload a PHP file with a shell command execution payload and execute arbitrary commands by accessing the uploaded file through a specific URL parameter. | |
| Title | Textpattern 4.8.3 - Remote code execution | |
| Weaknesses | CWE-434 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-23T16:47:34.814Z
Reserved: 2026-01-18T12:35:05.173Z
Link: CVE-2021-47888
No data.
Status : Received
Published: 2026-01-23T17:15:51.930
Modified: 2026-01-23T17:15:51.930
Link: CVE-2021-47888
No data.
OpenCVE Enrichment
No data.