<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File_upload — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file_upload/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 10 May 2026 13:21:12 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file_upload/feed.xml" rel="self" type="application/rss+xml"/><item><title>TextPattern CMS 4.8.7 Authenticated Remote Code Execution via File Upload (CVE-2021-47943)</title><link>https://feed.craftedsignal.io/briefs/2026-05-textpattern-rce/</link><pubDate>Sun, 10 May 2026 13:21:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-textpattern-rce/</guid><description>TextPattern CMS 4.8.7 contains a remote code execution vulnerability (CVE-2021-47943) that allows authenticated attackers to execute arbitrary commands by uploading malicious PHP files and accessing them with crafted GET requests.</description><content:encoded><![CDATA[<p>TextPattern CMS 4.8.7 is vulnerable to remote code execution (CVE-2021-47943). This vulnerability allows authenticated attackers to execute arbitrary commands on the underlying server. The attack vector involves exploiting the file upload functionality within the CMS. An attacker with valid user credentials can upload a specially crafted PHP file, effectively a webshell, to the server. Once the file is uploaded, the attacker can then trigger the execution of arbitrary commands by accessing the uploaded file via a direct HTTP request, passing commands as GET parameters. This can lead to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the TextPattern CMS 4.8.7 application with valid credentials.</li>
<li>Attacker navigates to the &ldquo;Files&rdquo; section within the content area of the CMS.</li>
<li>Attacker uploads a malicious PHP file (webshell) through the file upload functionality. This file contains PHP code designed to execute system commands.</li>
<li>The CMS saves the uploaded file to the /textpattern/files/ directory.</li>
<li>Attacker crafts a malicious HTTP GET request to access the uploaded PHP file (e.g., /textpattern/files/shell.php).</li>
<li>The GET request includes parameters that are passed to the <code>system</code> function within the uploaded PHP file (e.g., /textpattern/files/shell.php?cmd=id).</li>
<li>The server executes the system command specified in the GET parameter via the <code>system</code> function.</li>
<li>The output of the executed command is returned to the attacker in the HTTP response, allowing the attacker to gain command execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability grants the attacker the ability to execute arbitrary commands on the web server. This could lead to complete compromise of the server, data exfiltration, defacement of the website, or further lateral movement within the network. While the specific number of affected installations is unknown, any TextPattern CMS 4.8.7 instance with authenticated users is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply available patches or upgrade to a secure version of TextPattern CMS to remediate CVE-2021-47943.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2021-47943 TextPattern File Upload RCE&rdquo; to detect attempts to exploit this vulnerability by monitoring for access to uploaded PHP files in the <code>/textpattern/files/</code> directory.</li>
<li>Implement strict file upload policies, including file type validation and size limits, to prevent the upload of malicious files.</li>
<li>Restrict access to the /textpattern/files/ directory to authorized users only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>cve</category><category>rce</category><category>file_upload</category><category>textpattern_cms</category></item></channel></rss>