Vulnerability Details : CVE-2021-23258
Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE).
Products affected by CVE-2021-23258
- cpe:2.3:a:craftercms:crafter_cms:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-23258
0.29%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 50 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-23258
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.5
|
MEDIUM | AV:N/AC:L/Au:S/C:P/I:P/A:P |
8.0
|
6.4
|
NIST | |
7.2
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
1.2
|
5.9
|
NIST | |
4.2
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H |
0.5
|
3.6
|
Crafter CMS |
CWE ids for CVE-2021-23258
-
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.Assigned by:
- nvd@nist.gov (Primary)
- security@craftersoftware.com (Secondary)
References for CVE-2021-23258
-
https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101
Security Advisories — Crafter CMS 3.1.17 documentationVendor Advisory
Jump to