CuteEditor for PHP (now referred to as Rich Text Editor) 6.6 contains a directory traversal vulnerability in the browse template feature that allows attackers to write files to arbitrary web root directories. Attackers can exploit the ServerMapPath() function by renaming uploaded HTML files using directory traversal sequences to write files outside the intended template directory.
References
| Link | Resource |
|---|---|
| http://phphtmledit.com/ | Product |
| https://www.exploit-db.com/exploits/50994 | Exploit |
| https://www.vulncheck.com/advisories/cuteeditor-for-php-directory-traversal | Third Party Advisory |
| https://www.exploit-db.com/exploits/50994 | Exploit |
Configurations
History
No history.
Information
Published : 2026-01-13 23:15
Updated : 2026-02-02 16:16
NVD link : CVE-2021-47751
Mitre link : CVE-2021-47751
CVE.ORG link : CVE-2021-47751
JSON object : View
Products Affected
phphtmledit
- rich_text_editor
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
