CVE-2021-20837
CRITICAL EXPLOITED IN THE WILD NUCLEIMovable Type <7 r.5002 - RCE
Title source: llmDescription
Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.
Exploits (7)
exploitdb
WORKING POC
VERIFIED
by Charl-Alexandre Le Brun · rubywebappscgi
https://www.exploit-db.com/exploits/50464
nomisec
WORKING POC
18 stars
by ghost-nemesis · remote
https://github.com/ghost-nemesis/cve-2021-20837-poc
Nuclei Templates (1)
MovableType - Remote Command Injection
CRITICALby dhiyaneshDK,hackergautam
Shodan:
http.title:"サインイン | movable type pro" || cpe:"cpe:2.3:a:sixapart:movable_type"
FOFA:
title="サインイン | movable type pro"
References (4)
Scores
CVSS v3
9.8
EPSS
0.9419
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2022-05-31
InTheWild.io
2022-05-31
CWE
CWE-78
Status
published
Products (3)
sixapart/movable_type
< 1.46 (2 CPE variants)
sixapart/movable_type
4.0 - 6.3.11
sixapart/movable_type
6.5.0 - 6.8.2 (2 CPE variants)
Published
Oct 26, 2021
Tracked Since
Feb 18, 2026