Skip to main content

CVE-2021-36573: n/a in n/a

Medium
VulnerabilityCVE-2021-36573cvecve-2021-36573n-acwe-79
Published: Thu Dec 15 2022 (12/15/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

File Upload vulnerability in Feehi CMS thru 2.1.1 allows attackers to run arbitrary code via crafted image upload.

AI-Powered Analysis

AILast updated: 06/21/2025, 15:08:22 UTC

Technical Analysis

CVE-2021-36573 is a file upload vulnerability identified in Feehi CMS, a content management system, affecting versions up to 2.1.1. The vulnerability allows an attacker to upload crafted image files that contain malicious code, which can then be executed on the server. This type of vulnerability typically arises from insufficient validation and sanitization of uploaded files, enabling attackers to bypass security controls and upload files that are not strictly images but contain embedded executable code or scripts. The vulnerability is classified under CWE-79, which relates to Cross-Site Scripting (XSS), indicating that the malicious payload could also include script injections that affect the integrity and confidentiality of the system. The CVSS 3.1 base score is 5.4 (medium severity), with vector metrics indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), user interaction (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L/I:L) but no impact on availability (A:N). The requirement for privileges and user interaction suggests that exploitation is not trivial and may require an authenticated user to upload the malicious file and another user to interact with it to trigger the code execution. The scope change indicates that the vulnerability affects components beyond the initially vulnerable component, potentially impacting the entire CMS environment. No known exploits are currently reported in the wild, and no official patches or vendor advisories are listed, which may indicate limited public awareness or exploitation to date. However, given the nature of CMS platforms and their common use in web-facing environments, this vulnerability poses a risk of unauthorized code execution, leading to potential defacement, data leakage, or further compromise of the hosting infrastructure.

Potential Impact

For European organizations using Feehi CMS, this vulnerability could lead to unauthorized code execution on web servers, compromising the confidentiality and integrity of hosted data and services. Attackers could leverage this to inject malicious scripts, deface websites, steal sensitive user information, or pivot to internal networks. Given that Feehi CMS is a web-facing platform, exploitation could disrupt business operations, damage reputation, and lead to regulatory compliance issues under GDPR if personal data is exposed. The requirement for user interaction and privileges somewhat limits the attack surface but does not eliminate risk, especially in environments with multiple users or weak access controls. Organizations in sectors with high web presence, such as media, education, or government, may face elevated risks. Additionally, the scope change implies that the vulnerability could affect multiple components, increasing potential damage. The absence of known exploits suggests a window of opportunity for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

Conduct an immediate audit of all Feehi CMS instances to identify versions in use and verify if they are at or below version 2.1.1. Implement strict file upload validation mechanisms, including MIME type checking, file extension whitelisting, and content inspection to ensure only legitimate image files are accepted. Enforce least privilege principles by limiting user roles that can upload files, and segregate duties to reduce the risk of malicious uploads. Apply web application firewall (WAF) rules tailored to detect and block suspicious file upload patterns and script injections targeting Feehi CMS. Monitor logs for unusual file upload activities and user interactions that could indicate exploitation attempts. If possible, isolate the CMS environment in a sandboxed or containerized setup to limit the impact of potential code execution. Engage with the Feehi CMS community or maintainers to obtain or request security patches or updates addressing this vulnerability. Educate users with upload privileges about the risks and signs of exploitation to reduce inadvertent triggering of malicious payloads. Regularly back up CMS data and configurations to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2021-07-12T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984ac4522896dcbf7a2b

Added to database: 5/21/2025, 9:09:30 AM

Last enriched: 6/21/2025, 3:08:22 PM

Last updated: 7/27/2025, 12:08:00 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats