<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Schlix Cms — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/schlix-cms/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 19:19:56 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/schlix-cms/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2021-47964: Schlix CMS Remote Code Execution via Malicious Extension Upload</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47964-schlix-rce/</link><pubDate>Fri, 15 May 2026 19:19:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2021-47964-schlix-rce/</guid><description>Schlix CMS 2.2.6-6 contains a remote code execution vulnerability, tracked as CVE-2021-47964, allowing authenticated attackers to execute arbitrary PHP code by uploading malicious extension packages through the block manager and triggering execution by accessing the 'About' tab.</description><content:encoded><![CDATA[<p>CVE-2021-47964 is a remote code execution (RCE) vulnerability affecting Schlix CMS version 2.2.6-6. This flaw allows authenticated attackers to inject and execute arbitrary PHP code on the target system. The attack vector involves uploading a malicious extension package disguised as a ZIP file via the block manager functionality. The injected PHP code, typically embedded within the packageinfo.inc file of the extension, is then executed when an administrator accesses the &ldquo;About&rdquo; tab of the newly installed extension. Exploitation grants the attacker the ability to execute commands on the web server, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the Schlix CMS application.</li>
<li>The attacker navigates to the block manager interface within the CMS.</li>
<li>The attacker crafts a malicious ZIP file containing a PHP file, commonly named <code>packageinfo.inc</code>, with the injected PHP code intended for execution.</li>
<li>The attacker uploads the malicious ZIP file as a new extension through the block manager.</li>
<li>The Schlix CMS processes the uploaded ZIP file and installs the &ldquo;extension&rdquo;.</li>
<li>The attacker navigates to the &ldquo;About&rdquo; tab of the installed extension through the CMS interface.</li>
<li>Accessing the &ldquo;About&rdquo; tab triggers the execution of the injected PHP code within the <code>packageinfo.inc</code> file.</li>
<li>The attacker achieves remote code execution on the server, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2021-47964 allows an authenticated attacker to execute arbitrary PHP code on the affected Schlix CMS server. This can lead to complete system compromise, data theft, website defacement, or further lateral movement within the network. Given the ease of exploitation and the severity of the impact, organizations using Schlix CMS 2.2.6-6 are at significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Schlix CMS that addresses CVE-2021-47964, if available.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2021-47964 Exploitation — Malicious Extension Upload&rdquo; to detect attempts to upload malicious ZIP files containing PHP code via the block manager.</li>
<li>Monitor web server logs for POST requests to the block manager interface (<code>/admin/</code>) with suspicious ZIP file uploads, as indicated in the Sigma rule.</li>
<li>Implement strict access control policies to limit who can upload and install extensions within the Schlix CMS environment.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>CVE-2021-47964</category><category>rce</category><category>schlix cms</category><category>php</category></item></channel></rss>