CVE-2021-20837

CRITICAL EXPLOITED IN THE WILD NUCLEI

Movable Type <7 r.5002 - RCE

Title source: llm

Description

Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.

Exploits (7)

exploitdb WORKING POC VERIFIED
by Charl-Alexandre Le Brun · rubywebappscgi
https://www.exploit-db.com/exploits/50464
nomisec WORKING POC 21 stars
by orangmuda · remote
https://github.com/orangmuda/CVE-2021-20837
nomisec WORKING POC 18 stars
by ghost-nemesis · remote
https://github.com/ghost-nemesis/cve-2021-20837-poc
gitlab WORKING POC
by thomstack · remote
https://gitlab.com/thomstack/cve-2021-20837
nomisec WORKING POC
by bb33bb · poc
https://github.com/bb33bb/CVE-2021-20837
nomisec STUB
by Cosemz · poc
https://github.com/Cosemz/CVE-2021-20837

Nuclei Templates (1)

MovableType - Remote Command Injection
CRITICALby dhiyaneshDK,hackergautam
Shodan: http.title:"サインイン | movable type pro" || cpe:"cpe:2.3:a:sixapart:movable_type"
FOFA: title="サインイン | movable type pro"

Scores

CVSS v3 9.8
EPSS 0.9419
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2022-05-31
InTheWild.io 2022-05-31
CWE
CWE-78
Status published
Products (3)
sixapart/movable_type < 1.46 (2 CPE variants)
sixapart/movable_type 4.0 - 6.3.11
sixapart/movable_type 6.5.0 - 6.8.2 (2 CPE variants)
Published Oct 26, 2021
Tracked Since Feb 18, 2026