<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>TextPattern CMS 4.9.0-Dev — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/textpattern-cms-4.9.0-dev/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 16 May 2026 16:22:09 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/textpattern-cms-4.9.0-dev/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2021-47976 - TextPattern CMS Authenticated Remote Code Execution via Plugin Upload</title><link>https://feed.craftedsignal.io/briefs/2026-05-textpattern-rce/</link><pubDate>Sat, 16 May 2026 16:22:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-textpattern-rce/</guid><description>TextPattern CMS 4.9.0-dev is vulnerable to remote code execution (CVE-2021-47976), allowing authenticated attackers to upload arbitrary PHP files and achieve code execution by exploiting the plugin upload functionality.</description><content:encoded><![CDATA[<p>TextPattern CMS version 4.9.0-dev is susceptible to a remote code execution (RCE) vulnerability, identified as CVE-2021-47976. This flaw allows authenticated attackers to upload malicious PHP files to the server, leading to arbitrary code execution. The vulnerability resides within the plugin upload functionality. An attacker must first authenticate to the TextPattern CMS application. Once authenticated, the attacker can retrieve a valid CSRF token from the plugin event page. This token is then used in conjunction with the malicious PHP file upload request to bypass CSRF protections, placing the malicious code in the textpattern/tmp/ directory. This vulnerability poses a significant risk to organizations using the affected TextPattern CMS version, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the TextPattern CMS 4.9.0-dev web application.</li>
<li>Attacker navigates to the plugin event page to retrieve a valid CSRF token.</li>
<li>The attacker crafts a malicious PHP file designed to execute arbitrary commands on the server.</li>
<li>The attacker initiates a file upload request targeting the plugin upload functionality.</li>
<li>The attacker includes the retrieved CSRF token within the upload request to bypass CSRF protection mechanisms.</li>
<li>The malicious PHP file is successfully uploaded to the textpattern/tmp/ directory on the server.</li>
<li>The attacker triggers the execution of the uploaded PHP file by accessing it via a web request.</li>
<li>The malicious PHP file executes arbitrary commands on the server, granting the attacker control of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2021-47976 can lead to complete compromise of the TextPattern CMS server. An attacker can gain unauthorized access to sensitive data, modify website content, install backdoors, or use the compromised server as a launchpad for further attacks against other systems within the network. Due to the potential for full system compromise, this vulnerability poses a critical risk to organizations utilizing the affected TextPattern CMS version.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or updates provided by Textpattern to address CVE-2021-47976.</li>
<li>Implement the Sigma rule &ldquo;Detect Textpattern CMS PHP Upload via CVE-2021-47976&rdquo; to detect attempts to exploit this vulnerability via webserver logs.</li>
<li>Monitor web server logs for suspicious file uploads to the /textpattern/tmp/ directory, and cross-reference with authentication events.</li>
<li>Review and restrict plugin upload permissions within TextPattern CMS to only authorized administrators.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rce</category><category>csrf</category><category>textpattern</category></item></channel></rss>