OpenBMCS 2.4 allows an attacker to escalate privileges from a read user to an admin user by manipulating permissions and exploiting a vulnerability in the update_user_permissions.php script. Attackers can submit a malicious HTTP POST request to PHP scripts in '/plugins/useradmin/' directory.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/50669 | Exploit Third Party Advisory VDB Entry |
| https://www.vulncheck.com/advisories/openbmcs-user-management-privilege-escalation | Third Party Advisory |
| https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5693.php | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-09 21:15
Updated : 2025-12-17 14:14
NVD link : CVE-2021-47701
Mitre link : CVE-2021-47701
CVE.ORG link : CVE-2021-47701
JSON object : View
Products Affected
openbmcs
- openbmcs
CWE
CWE-862
Missing Authorization
