CVE-2021-47758
Published: 15 January 2026
Description
Chikitsa Patient Management System 2.0.2 contains an authenticated remote code execution vulnerability that allows attackers to upload malicious PHP plugins through the module upload functionality. Authenticated attackers can generate and upload a ZIP plugin with a PHP backdoor that enables…
more
arbitrary command execution on the server through a weaponized PHP script.
Mitigating Controls (NIST 800-53 r5)AI
Validates uploaded ZIP files and their contents to block malicious PHP backdoors, directly addressing the unrestricted upload of dangerous file types leading to RCE.
Identifies, prioritizes, and remediates the specific flaw in the module upload functionality, preventing exploitation of this CVE through timely patching.
Deploys malicious code protection at the upload entry point to scan and eradicate PHP backdoors in ZIP plugins before execution.
Security SummaryAI
CVE-2021-47758 is an authenticated remote code execution vulnerability affecting Chikitsa Patient Management System version 2.0.2. The issue stems from the module upload functionality, which permits attackers to upload malicious PHP plugins packaged as ZIP files containing weaponized PHP scripts that function as backdoors.
Authenticated attackers with low privileges can exploit this vulnerability remotely over the network with low attack complexity and no user interaction. Exploitation allows the generation and upload of a ZIP plugin embedding a PHP backdoor, enabling arbitrary command execution on the server and resulting in high impacts to confidentiality, integrity, and availability, as indicated by the CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and association with CWE-434 (Unrestricted Upload of File with Dangerous Type).
References point to the project's GitHub repository at https://github.com/sanskruti-technologies/chikitsa, SourceForge page at https://sourceforge.net/projects/chikitsa/, official site at https://www.chikitsa.io/, and an Exploit-DB entry at https://www.exploit-db.com/exploits/50571, but no specific advisories or patch details are detailed in the provided information.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- Other AI Platforms
- Risk Domain
- N/A
- OWASP Top 10 for LLMs 2025
- None mapped
- MITRE ATLAS Techniques
- None mapped
- Classification Reason
- Matched keywords: backdoor
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows authenticated attackers to upload ZIP files containing malicious PHP backdoors (web shells) to a public-facing web application, enabling remote code execution (T1190: Exploit Public-Facing Application, T1505.003: Web Shell).