CVE-2021-47976
Published: 16 May 2026
Summary
CVE-2021-47976 is a high-severity CSRF (CWE-352) vulnerability in Textpattern (inferred from references). Its CVSS base score is 8.8 (High).
Operationally, it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Awareness training educates users on avoiding untrusted links and actions that can be exploited via CSRF.
Requiring user re-entry of credentials for sensitive actions prevents automated forgery of requests without active user participation.
Security testing regimens explicitly include checks for missing or ineffective anti-CSRF protections in web applications.
Detects anomalous request patterns consistent with cross-site request forgery.
NVD Description
TextPattern CMS 4.9.0-dev contains a remote code execution vulnerability that allows authenticated attackers to upload arbitrary PHP files by exploiting the plugin upload functionality. Attackers can authenticate, retrieve a CSRF token from the plugin event page, and upload malicious PHP…
more
files to the textpattern/tmp/ directory for code execution.
Deeper analysisAI
Automated synthesis unavailable for this CVE.
Details
- CWE(s)