e107 CMS 2.3.0 contains a remote code execution vulnerability that allows authenticated users with theme installation permissions to execute arbitrary commands by uploading malicious theme files. Attackers can upload a crafted theme package through the theme.php endpoint that deploys a web shell to the e107_themes directory, then execute system commands via the payload.php script.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 10 May 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | e107 CMS 2.3.0 contains a remote code execution vulnerability that allows authenticated users with theme installation permissions to execute arbitrary commands by uploading malicious theme files. Attackers can upload a crafted theme package through the theme.php endpoint that deploys a web shell to the e107_themes directory, then execute system commands via the payload.php script. | |
| Title | e107 CMS 2.3.0 Authenticated Remote Code Execution via Theme Upload | |
| First Time appeared |
E107
E107 e107 Cms |
|
| Weaknesses | CWE-434 | |
| CPEs | cpe:2.3:a:e107:e107_cms:2.3.0:*:*:*:*:*:*:* | |
| Vendors & Products |
E107
E107 e107 Cms |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-10T12:43:55.715Z
Reserved: 2026-02-01T11:24:18.717Z
Link: CVE-2021-47937
No data.
Status : Received
Published: 2026-05-10T13:16:29.960
Modified: 2026-05-10T13:16:29.960
Link: CVE-2021-47937
No data.
OpenCVE Enrichment
Updated: 2026-05-10T15:00:11Z
Weaknesses