<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2021-47939 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2021-47939/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 10 May 2026 13:20:49 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2021-47939/feed.xml" rel="self" type="application/rss+xml"/><item><title>Evolution CMS Authenticated Remote Code Execution via Module Creation (CVE-2021-47939)</title><link>https://feed.craftedsignal.io/briefs/2026-05-evolution-cms-rce/</link><pubDate>Sun, 10 May 2026 13:20:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-evolution-cms-rce/</guid><description>Evolution CMS version 3.1.6 is vulnerable to remote code execution, where authenticated users with module creation permissions can inject PHP code into module parameters, allowing them to execute arbitrary system commands by sending POST requests to '/manager/index.php' with malicious PHP code in the 'post' parameter to create modules that execute arbitrary commands when invoked, as tracked by CVE-2021-47939.</description><content:encoded><![CDATA[<p>Evolution CMS 3.1.6 is susceptible to a remote code execution (RCE) vulnerability, CVE-2021-47939. This flaw allows authenticated users who possess module creation privileges to inject arbitrary PHP code into module parameters. Successful exploitation enables attackers to execute system-level commands on the underlying server. The vulnerability stems from insufficient input validation during module creation, making it possible to inject and execute malicious PHP code through crafted POST requests. This poses a significant risk to organizations using Evolution CMS, potentially leading to full system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid credentials for an Evolution CMS account with module creation permissions.</li>
<li>The attacker crafts a POST request targeting <code>/manager/index.php</code>.</li>
<li>The POST request includes malicious PHP code within the <code>post</code> parameter, designed to create a module.</li>
<li>The injected PHP code is crafted to execute arbitrary system commands.</li>
<li>The attacker submits the malicious POST request to create the module.</li>
<li>The newly created module, containing the injected PHP code, is saved on the server.</li>
<li>The attacker invokes the newly created module, triggering the execution of the injected PHP code.</li>
<li>The server executes the injected PHP code, allowing the attacker to run arbitrary system commands, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2021-47939 allows an attacker to execute arbitrary system commands on the Evolution CMS server. This can lead to complete compromise of the system, including data theft, modification, or destruction. The attacker can potentially gain access to sensitive information, install malware, or use the compromised server as a staging ground for further attacks within the network. Given the high CVSS score of 8.8, this vulnerability poses a significant risk to organizations using affected versions of Evolution CMS.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a secure version of Evolution CMS to remediate CVE-2021-47939.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2021-47939 Exploitation Attempt via Malicious POST Request&rdquo; to identify exploitation attempts based on the injection of PHP code in POST requests.</li>
<li>Implement strict input validation and sanitization measures to prevent code injection vulnerabilities in web applications.</li>
<li>Monitor web server logs for suspicious POST requests to <code>/manager/index.php</code> containing PHP code within the <code>post</code> parameter using the log source &ldquo;webserver&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>cve-2021-47939</category><category>rce</category><category>code-injection</category></item></channel></rss>