CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. Attackers can exploit the ServerMapPath() function by renaming uploaded HTML files using directory traversal sequences to write files outside the intended template directory.

Project Subscriptions

Vendors Products
Phphtmledit Subscribe
Cuteeditor Subscribe
Rich Text Editor Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 02 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Thu, 29 Jan 2026 01:00:00 +0000

Type Values Removed Values Added
First Time appeared Phphtmledit rich Text Editor
CPEs cpe:2.3:a:phphtmledit:rich_text_editor:*:*:*:*:*:*:*:*
Vendors & Products Phphtmledit rich Text Editor

Wed, 14 Jan 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Phphtmledit
Phphtmledit cuteeditor
Vendors & Products Phphtmledit
Phphtmledit cuteeditor

Tue, 13 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. Attackers can exploit the ServerMapPath() function by renaming uploaded HTML files using directory traversal sequences to write files outside the intended template directory.
Title CuteEditor for PHP 6.6 - Directory Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-02T15:58:16.817Z

Reserved: 2026-01-10T13:48:08.268Z

Link: CVE-2021-47751

cve-icon Vulnrichment

Updated: 2026-01-14T15:54:48.587Z

cve-icon NVD

Status : Modified

Published: 2026-01-13T23:15:49.273

Modified: 2026-02-02T16:16:14.523

Link: CVE-2021-47751

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-14T11:07:55Z

Weaknesses