CVE-2021-4462
Published: 10 November 2025
Description
Employee Records System version 1.0 contains an unrestricted file upload vulnerability that allows a remote unauthenticated attacker to upload arbitrary files via the uploadID.php endpoint; uploaded files can be executed because the application does not perform proper server-side validation. Exploitation…
more
evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires server-side validation of file uploads including MIME types, extensions, and content, addressing the core flaw in uploadID.php that enables arbitrary file uploads.
Mandates timely identification, reporting, and patching of the specific unrestricted file upload vulnerability in Employee Records System v1.0.
Restricts classes of information inputs to prevent upload of dangerous file types, mitigating unrestricted arbitrary file uploads at the uploadID.php endpoint.
Security SummaryAI
CVE-2021-4462 is an unrestricted file upload vulnerability in Employee Records System version 1.0. The flaw exists in the uploadID.php endpoint, where the application fails to perform proper server-side validation, enabling attackers to upload arbitrary files that can subsequently be executed. This issue is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact remote code execution.
A remote unauthenticated attacker can exploit this vulnerability by sending malicious files to the uploadID.php endpoint. Successful exploitation allows arbitrary file upload and execution on the server, potentially granting full control over the affected system, including data exfiltration, modification, or further compromise.
Advisories from sources like VulnCheck detail the arbitrary file upload leading to remote code execution and provide proof-of-concept exploits available on Exploit-DB. Mitigation recommendations include applying patches if available from the vendor, implementing strict server-side file validation (e.g., checking MIME types, extensions, and content), restricting upload directories to non-executable paths, and disabling dangerous file execution via web server configurations.
Exploitation evidence for CVE-2021-4462 was observed in the wild by the Shadowserver Foundation on 2025-02-06 UTC, confirming active real-world abuse prior to the CVE's publication on 2025-11-10.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Unrestricted file upload in public-facing web application enables remote unauthenticated RCE via arbitrary executable files like web shells, directly mapping to T1190 (Exploit Public-Facing Application) and T1100 (Web Shell).