TextPattern CMS 4.9.0-dev contains a remote code execution vulnerability that allows authenticated attackers to upload arbitrary PHP files by exploiting the plugin upload functionality. Attackers can authenticate, retrieve a CSRF token from the plugin event page, and upload malicious PHP files to the textpattern/tmp/ directory for code execution.
Metrics
Affected Vendors & Products
References
History
Sat, 16 May 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TextPattern CMS 4.9.0-dev contains a remote code execution vulnerability that allows authenticated attackers to upload arbitrary PHP files by exploiting the plugin upload functionality. Attackers can authenticate, retrieve a CSRF token from the plugin event page, and upload malicious PHP files to the textpattern/tmp/ directory for code execution. | |
| Title | TextPattern CMS 4.9.0-dev Authenticated Remote Code Execution via Plugin Upload | |
| First Time appeared |
Textpattern
Textpattern textpattern |
|
| Weaknesses | CWE-352 | |
| CPEs | cpe:2.3:a:textpattern:textpattern:4.9.0-dev:*:*:*:*:*:*:* cpe:2.3:a:textpattern:textpattern:4.9.0:-:*:*:*:*:*:* cpe:2.3:a:textpattern:textpattern:4.9.0:beta1:*:*:*:*:*:* cpe:2.3:a:textpattern:textpattern:4.9.0:beta1a:*:*:*:*:*:* cpe:2.3:a:textpattern:textpattern:4.9.0:beta2:*:*:*:*:*:* cpe:2.3:a:textpattern:textpattern:4.9.0:beta:*:*:*:*:*:* |
|
| Vendors & Products |
Textpattern
Textpattern textpattern |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-16T15:26:16.409Z
Reserved: 2026-05-16T14:41:11.033Z
Link: CVE-2021-47976
No data.
Status : Received
Published: 2026-05-16T16:16:23.107
Modified: 2026-05-16T16:16:23.107
Link: CVE-2021-47976
No data.
OpenCVE Enrichment
Updated: 2026-05-16T16:30:27Z