CVE-2021-47701

OpenBMCS 2.4 allows an attacker to escalate privileges from a read user to an admin user by manipulating permissions and exploiting a vulnerability in the update_user_permissions.php script. Attackers can submit a malicious HTTP POST request to PHP scripts in '/plugins/useradmin/' directory.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openbmcs:openbmcs:2.4:*:*:*:*:*:*:*

History

17 Dec 2025, 14:14

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8
CPE cpe:2.3:a:openbmcs:openbmcs:2.4:*:*:*:*:*:*:*
References () https://www.exploit-db.com/exploits/50669 - () https://www.exploit-db.com/exploits/50669 - Exploit, Third Party Advisory, VDB Entry
References () https://www.vulncheck.com/advisories/openbmcs-user-management-privilege-escalation - () https://www.vulncheck.com/advisories/openbmcs-user-management-privilege-escalation - Third Party Advisory
References () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5693.php - () https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5693.php - Exploit, Third Party Advisory
First Time Openbmcs openbmcs
Openbmcs

09 Dec 2025, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-09 21:15

Updated : 2025-12-17 14:14


NVD link : CVE-2021-47701

Mitre link : CVE-2021-47701

CVE.ORG link : CVE-2021-47701


JSON object : View

Products Affected

openbmcs

  • openbmcs
CWE
CWE-862

Missing Authorization