An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://projectblack.io/blog/zendto-nday-vulnerabilities/ |
![]() ![]() ![]() |
History
Mon, 07 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 05 Apr 2025 05:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-78 | |
Metrics |
cvssV3_1
|
Sat, 05 Apr 2025 05:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An OS command injection vulnerability in lib/NSSDropoff.php in ZendTo 5.24-3 through 6.x before 6.10-7 allows unauthenticated remote attackers to execute arbitrary commands via shell metacharacters in the tmp_name parameter when dropping off a file via a POST /dropoff request. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-04-05T00:00:00.000Z
Updated: 2025-04-07T16:22:26.249Z
Reserved: 2025-04-05T00:00:00.000Z
Link: CVE-2021-47667

Updated: 2025-04-07T16:22:16.500Z

Status : Awaiting Analysis
Published: 2025-04-05T05:15:43.223
Modified: 2025-04-07T17:15:32.873
Link: CVE-2021-47667

No data.