
Cloud Vulnerability DB
A community-led vulnerabilities database
Fork CMS version 5.9.2 contains an arbitrary file upload vulnerability (CVE-2021-28931) that was disclosed on July 7, 2021. The vulnerability allows attackers to create or replace arbitrary files in the /themes directory of the content management system (NVD).
The vulnerability exists in the Themes panel of the settings tab, where authenticated users can upload new themes. An attacker can craft a custom zip file containing malicious code and a .htaccess file to create arbitrary files in the Themes folder. The .htaccess file can be configured to instruct the web server to execute new file types under the web application context (GitHub POC).
A successful exploitation of this vulnerability can result in complete web server compromise, particularly in shared hosting environments. Additionally, attackers can gain access to the database since they can read/access configuration files (GitHub POC).
To mitigate this vulnerability, developers should implement proper file sanitization during theme uploads, specifically to disallow .htaccess files. Users should upgrade to a version newer than 5.9.2 (GitHub POC).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."