High severity8.8NVD Advisory· Published May 10, 2026· Updated May 12, 2026
CVE-2021-47939
CVE-2021-47939
Description
Evolution CMS 3.1.6 contains a remote code execution vulnerability that allows authenticated users with module creation permissions to execute arbitrary system commands by injecting PHP code into module parameters. Attackers can send POST requests to /manager/index.php with malicious PHP code in the 'post' parameter to create modules that execute arbitrary commands when invoked.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
50- The End of Static Security: Why AI Demands Real-Time MicrosegmentationGovInfoSecurity · May 18, 2026
- New Cisco SD-WAN Zero-Day Grants Admin AccessGovInfoSecurity · May 18, 2026
- Turla Turns Kazuar Backdoor Into Modular P2P Botnet for Persistent AccessThe Hacker News · May 15, 2026
- Gremlin Stealer Evolves into Modular Threat with Advanced Evasion CapabilitiesInfosecurity Magazine · May 15, 2026
- Inside the REMUS Infostealer: Session Theft, MaaS, and Rapid EvolutionBleepingComputer · May 15, 2026
- The Good, the Bad and the Ugly in Cybersecurity – Week 20SentinelOne Labs · May 15, 2026
- Akamai to acquire LayerX for $205 millionHelp Net Security · May 15, 2026
- Gremlin Stealer's Evolved Tactics: Hiding in Plain Sight With Resource FilesUnit 42 · May 15, 2026
- 'FrostyNeighbor' APT Carefully Targets Govt Orgs in Poland, UkraineDark Reading · May 14, 2026
- G7 Countries Release AI SBOM GuidanceSecurityWeek · May 14, 2026
- Kimsuky targets organizations with PebbleDash-based toolsSecurelist · May 14, 2026
- Deepfake sextortion forces schools to remove student photos from websitesMalwarebytes Labs · May 14, 2026
- FrostyNeighbor: Fresh mischief and digital shenanigansESET WeLiveSecurity · May 14, 2026
- Dark Reading Celebrates 20 Years as a Leading Authority on Cybersecurity, Highlighting the People, Events, Ideas, and Technologies Shaping the Modern Risk LandscapeDark Reading · May 13, 2026
- LatAm Vibe Hackers Generate Custom Hacking Tools on the FlyDark Reading · May 13, 2026
- Inside AD CS Escalation: Unpacking Advanced Misuse Techniques and ToolsUnit 42 · May 11, 2026
- Red Hat extends open source technology into spaceHelp Net Security · May 11, 2026
- New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH CredentialsThe Hacker News · May 8, 2026
- New TCLBanker malware self-spreads over WhatsApp and OutlookBleepingComputer · May 7, 2026
- ThreatsDay Bulletin: Edge Plaintext Passwords, ICS 0-Days, Patch-or-Die Alerts and 25+ New StoriesThe Hacker News · May 7, 2026
- Muddying the Tracks: The State-Sponsored Shadow Behind Chaos RansomwareRapid7 Blog · May 6, 2026
- Extreme Networks introduces Agent ONE for autonomous enterprise networkingHelp Net Security · May 6, 2026
- UiPath adds agentic AI capabilities to Automation Suite for government agenciesHelp Net Security · May 6, 2026
- India orders infosec red alert in case Mythos sparks crime spreeThe Register Security · May 6, 2026
- How the Story of a USB Penetration Test Went ViralDark Reading · May 5, 2026
- ScarCruft Hacks Gaming Platform to Deploy BirdCall Malware on Android and WindowsThe Hacker News · May 5, 2026
- OpenAI To Extend Cyber Program to Government AgenciesInfosecurity Magazine · May 4, 2026
- Lens Agents brings policy control to AI across cloud and desktopHelp Net Security · May 4, 2026
- The npm Threat Landscape: Attack Surface and Mitigations (Updated May 1)Unit 42 · May 2, 2026
- 30,000 Facebook Accounts Hacked via Google AppSheet Phishing CampaignThe Hacker News · May 1, 2026
- Bridging the gap: How to integrate Claude Security into the Tenable One Exposure Management PlatformTenable Blog · Apr 30, 2026
- Deep#Door Python Backdoor Evades Detection On WindowsInfosecurity Magazine · Apr 30, 2026
- New Python Backdoor Uses Tunneling Service to Steal Browser and Cloud CredentialsThe Hacker News · Apr 30, 2026
- Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and IndiaSecurelist · Apr 30, 2026
- New Wave of DPRK Attacks Uses AI-Inserted npm Malware, Fake Firms, and RATsThe Hacker News · Apr 29, 2026
- PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian NetworksThe Hacker News · Apr 27, 2026
- Researchers Uncover Pre-Stuxnet ‘fast16’ Malware Targeting Engineering SoftwareThe Hacker News · Apr 25, 2026
- Friday Squid Blogging: How Squid Survived Extinction EventsSchneier on Security · Apr 24, 2026
- Tropic Trooper APT Takes Aim at Home Routers, Japanese TargetsDark Reading · Apr 24, 2026
- UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW MalwareThe Hacker News · Apr 23, 2026
- Bitwarden CLI Compromised in Ongoing Checkmarx Supply Chain CampaignThe Hacker News · Apr 23, 2026
- UK Faces a Cyber ‘Perfect Storm’ Driven by Tech Advances and Nation State Threats, NCSC WarnsInfosecurity Magazine · Apr 22, 2026
- Automation at Machine Speed: Rethinking Execution in Modern CybersecuritySentinelOne Labs · Apr 20, 2026
- The AI engineering stack we built internally — on the platform we shipCloudflare Blog · Apr 20, 2026
- Threat Brief: Escalation of Cyber Risk Related to Iran (Updated April 17)Unit 42 · Apr 17, 2026
- AI Companies to Play Bigger Role in CVE Program, Says CISAInfosecurity Magazine · Apr 15, 2026
- Mirax Android Trojan Turns Devices Into Residential Proxy NodesInfosecurity Magazine · Apr 13, 2026
- The Increasing Role of AI in Vulnerability ResearchWordfence Blog · Apr 10, 2026
- Edge Decay: How a Failing Perimeter Is Fueling Modern IntrusionsSentinelOne Labs · Apr 9, 2026
- Silver Fox Cyber Campaigns Show Shift Toward Dual EspionageInfosecurity Magazine · Mar 24, 2026