Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 02 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Thu, 29 Jan 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phphtmledit rich Text Editor
|
|
| CPEs | cpe:2.3:a:phphtmledit:rich_text_editor:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Phphtmledit rich Text Editor
|
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Phphtmledit
Phphtmledit cuteeditor |
|
| Vendors & Products |
Phphtmledit
Phphtmledit cuteeditor |
Tue, 13 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. Attackers can exploit the ServerMapPath() function by renaming uploaded HTML files using directory traversal sequences to write files outside the intended template directory. | |
| Title | CuteEditor for PHP 6.6 - Directory Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-02-02T15:58:16.817Z
Reserved: 2026-01-10T13:48:08.268Z
Link: CVE-2021-47751
Updated: 2026-01-14T15:54:48.587Z
Status : Modified
Published: 2026-01-13T23:15:49.273
Modified: 2026-02-02T16:16:14.523
Link: CVE-2021-47751
No data.
OpenCVE Enrichment
Updated: 2026-01-14T11:07:55Z