Cyber Posture

CVE-2021-4462

CriticalPublic PoC

Published: 10 November 2025

Published
10 November 2025
Modified
24 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.1726 95.1th percentile
Risk Priority 30 60% EPSS · 20% KEV · 20% CVSS

Description

Employee Records System version 1.0 contains an unrestricted file upload vulnerability that allows a remote unauthenticated attacker to upload arbitrary files via the uploadID.php endpoint; uploaded files can be executed because the application does not perform proper server-side validation. Exploitation…

more

evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires server-side validation of file uploads including MIME types, extensions, and content, addressing the core flaw in uploadID.php that enables arbitrary file uploads.

prevent

Mandates timely identification, reporting, and patching of the specific unrestricted file upload vulnerability in Employee Records System v1.0.

prevent

Restricts classes of information inputs to prevent upload of dangerous file types, mitigating unrestricted arbitrary file uploads at the uploadID.php endpoint.

Security SummaryAI

CVE-2021-4462 is an unrestricted file upload vulnerability in Employee Records System version 1.0. The flaw exists in the uploadID.php endpoint, where the application fails to perform proper server-side validation, enabling attackers to upload arbitrary files that can subsequently be executed. This issue is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact remote code execution.

A remote unauthenticated attacker can exploit this vulnerability by sending malicious files to the uploadID.php endpoint. Successful exploitation allows arbitrary file upload and execution on the server, potentially granting full control over the affected system, including data exfiltration, modification, or further compromise.

Advisories from sources like VulnCheck detail the arbitrary file upload leading to remote code execution and provide proof-of-concept exploits available on Exploit-DB. Mitigation recommendations include applying patches if available from the vendor, implementing strict server-side file validation (e.g., checking MIME types, extensions, and content), restricting upload directories to non-executable paths, and disabling dangerous file execution via web server configurations.

Exploitation evidence for CVE-2021-4462 was observed in the wild by the Shadowserver Foundation on 2025-02-06 UTC, confirming active real-world abuse prior to the CVE's publication on 2025-11-10.

Details

CWE(s)

Affected Products

skittles
employee records system
1.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Unrestricted file upload in public-facing web application enables remote unauthenticated RCE via arbitrary executable files like web shells, directly mapping to T1190 (Exploit Public-Facing Application) and T1100 (Web Shell).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References