ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.
                
            References
                    | Link | Resource | 
|---|---|
| https://hackerone.com/reports/1093444 | Permissions Required Third Party Advisory | 
| http://karmainsecurity.com/KIS-2021-03 | Exploit Third Party Advisory | 
| https://expressionengine.com/features | Vendor Advisory | 
| http://seclists.org/fulldisclosure/2021/Mar/32 | Mailing List Third Party Advisory | 
| http://packetstormsecurity.com/files/161805/ExpressionEngine-6.0.2-PHP-Code-Injection.html | Exploit Third Party Advisory VDB Entry | 
Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Information
                Published : 2021-03-15 16:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-27230
Mitre link : CVE-2021-27230
JSON object : View
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
Products Affected
                expressionengine
- expressionengine
 


