<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Authenticated — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/authenticated/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 10 May 2026 13:20:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/authenticated/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2021-47937: e107 CMS Authenticated Remote Code Execution via Theme Upload</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47937-e107-rce/</link><pubDate>Sun, 10 May 2026 13:20:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47937-e107-rce/</guid><description>e107 CMS 2.3.0 contains a remote code execution vulnerability (CVE-2021-47937) that allows authenticated users with theme installation permissions to execute arbitrary commands by uploading malicious theme files, leading to arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>e107 CMS version 2.3.0 is vulnerable to remote code execution (CVE-2021-47937). This vulnerability allows authenticated users who possess theme installation permissions to execute arbitrary commands on the server. The attack involves uploading a specially crafted theme file through the <code>theme.php</code> endpoint. The uploaded theme package includes a web shell that is deployed to the <code>e107_themes</code> directory. Once deployed, attackers can execute arbitrary system commands by accessing the <code>payload.php</code> script, effectively gaining control of the server. This vulnerability poses a significant risk to e107 CMS deployments, as it enables unauthorized code execution and potentially full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the e107 CMS application with an account that has theme installation permissions.</li>
<li>The attacker crafts a malicious theme package containing a PHP web shell (e.g., <code>payload.php</code>).</li>
<li>The attacker uploads the malicious theme package via the <code>theme.php</code> endpoint.</li>
<li>The e107 CMS installs the uploaded theme, placing the web shell (e.g., <code>payload.php</code>) within the <code>e107_themes</code> directory.</li>
<li>The attacker sends an HTTP request to the deployed web shell (<code>e107_themes/payload.php</code>).</li>
<li>The web shell executes arbitrary system commands specified in the HTTP request parameters (e.g., <code>payload.php?cmd=whoami</code>).</li>
<li>The server executes the command, and the web shell returns the output to the attacker.</li>
<li>The attacker uses the web shell to perform further actions such as escalating privileges, installing malware, or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2021-47937 leads to remote code execution, allowing attackers to gain complete control over the e107 CMS server. An attacker could potentially deface websites, steal sensitive data, install malware, or use the compromised server as a foothold for further attacks within the network. The CVSS v3.1 score of 8.8 highlights the high severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply any available patches or upgrades provided by e107 to address CVE-2021-47937.</li>
<li>Restrict theme installation permissions to only highly trusted administrators to limit the attack surface.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious e107 Theme Upload - CVE-2021-47937</code> to identify attempts to upload malicious theme files.</li>
<li>Monitor web server logs for access to unusual PHP files within the <code>e107_themes</code> directory to detect web shell activity (e.g., <code>payload.php</code>).</li>
<li>Implement strict file upload validation to prevent the upload of potentially malicious files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>rce</category><category>e107</category><category>web-shell</category><category>authenticated</category><category>CVE-2021-47937</category></item></channel></rss>