CVE-2021-47783
BaseFortify
Publication date: 2026-01-16
Last updated on: 2026-02-09
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| phpwcms | phpwcms | 1.9.30 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in phpwcms version 1.9.30 allows authenticated attackers to upload malicious SVG files that contain embedded JavaScript code. By using the multiple file upload feature, attackers can upload crafted SVG payloads that execute cross-site scripting (XSS) attacks on the platform, potentially compromising the security of the system. [2, 3]
How can this vulnerability impact me? :
The vulnerability can allow an authenticated attacker to upload malicious SVG files with embedded JavaScript, which can then execute cross-site scripting (XSS) attacks. This can lead to unauthorized script execution in the context of the web application, potentially compromising user data, session tokens, or enabling further attacks such as remote code execution or client-side exploitation. [2, 3]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
To detect this vulnerability, you can check for the presence of uploaded SVG files with embedded JavaScript in the upload directories of phpwcms 1.9.30. Since the exploit requires authenticated access, monitoring file uploads through the multiple file upload feature is essential. You can use commands to search for SVG files containing script tags, for example, on the server: `grep -ril '<script' /path/to/phpwcms/upload/*.svg` to find SVG files with embedded JavaScript. Additionally, reviewing web server logs for POST requests to the multiple file upload endpoint (`phpwcms.php?do=files&p=8`) can help identify suspicious upload activity. Authentication logs can also be checked for unusual login activity. These steps help detect exploitation attempts or presence of malicious files. [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include restricting or disabling the multiple file upload feature for authenticated users until a patch or update is applied. Upgrade phpwcms to a later version where this vulnerability is fixed (the latest version is 1.11.0 as of November 2025). Implement strict file type validation and sanitization on uploaded files to prevent SVG files with embedded JavaScript from being accepted. Additionally, monitor and remove any malicious SVG files already uploaded. Applying web application firewall (WAF) rules to block malicious payloads and limiting user privileges to reduce the risk of exploitation are also recommended. [1, 3]