CWE
434
Advisory Published
Updated

CVE-2021-46367: Malicious File Upload

First published: Fri Apr 08 2022(Updated: )

RiteCMS version 3.1.0 and below suffers from a remote code execution vulnerability in the admin panel. An authenticated attacker can upload a PHP file and bypass the .htacess configuration to deny execution of .php files in media and files directory by default.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
RiteCMS<=3.1.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-46367?

    CVE-2021-46367 is a remote code execution vulnerability in RiteCMS version 3.1.0 and below.

  • How does CVE-2021-46367 work?

    An authenticated attacker can upload a PHP file and bypass the .htacess configuration to execute the uploaded .php files in the media and files directory.

  • What is the severity level of CVE-2021-46367?

    CVE-2021-46367 has a severity level of critical, with a score of 7.2.

  • How can I fix CVE-2021-46367?

    Upgrade RiteCMS to a version higher than 3.1.0 or apply the necessary patches provided by the vendor.

  • Where can I find more information about CVE-2021-46367?

    You can find more information about CVE-2021-46367 at the following references: [1] [2] [3]

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203