Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phphtmledit
Phphtmledit cuteeditor |
|
| Vendors & Products |
Phphtmledit
Phphtmledit cuteeditor |
Tue, 13 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. Attackers can exploit the ServerMapPath() function by renaming uploaded HTML files using directory traversal sequences to write files outside the intended template directory. | |
| Title | CuteEditor for PHP 6.6 - Directory Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-13T22:51:39.055Z
Reserved: 2026-01-10T13:48:08.268Z
Link: CVE-2021-47751
No data.
Status : Awaiting Analysis
Published: 2026-01-13T23:15:49.273
Modified: 2026-01-14T16:25:12.057
Link: CVE-2021-47751
No data.
OpenCVE Enrichment
Updated: 2026-01-14T11:07:55Z