{"api_version":"1","generated_at":"2026-04-23T04:10:41+00:00","cve":"CVE-2021-20837","urls":{"html":"https://cve.report/CVE-2021-20837","api":"https://cve.report/api/cve/CVE-2021-20837.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-20837","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-20837"},"summary":{"title":"CVE-2021-20837","description":"Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.","state":"PUBLIC","assigner":"vultures@jpcert.or.jp","published_at":"2021-10-26 06:15:00","updated_at":"2021-11-28 23:11:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://movabletype.org/news/2021/10/mt-782-683-released.html","name":"https://movabletype.org/news/2021/10/mt-782-683-released.html","refsource":"MISC","tags":[],"title":"MovableType.org – News:                      Movable Type 7 r.5003 (v7.8.2), v6.8.3: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html","name":"http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html","refsource":"MISC","tags":[],"title":"Movable Type 7 r.5002 XMLRPC API Remote Command Injection ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html","name":"http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html","refsource":"MISC","tags":[],"title":"Movable Type 7 r.5002 XMLRPC API Remote Command Injection ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://jvn.jp/en/jp/JVN41119755/index.html","name":"https://jvn.jp/en/jp/JVN41119755/index.html","refsource":"MISC","tags":[],"title":"JVN#41119755: Movable Type XMLRPC API vulnerable to OS command injection","mime":"text/xml","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-20837","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-20837","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"20837","vulnerable":"1","versionEndIncluding":"1.46","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sixapart","cpe5":"movable_type","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"premium","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20837","vulnerable":"1","versionEndIncluding":"1.46","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sixapart","cpe5":"movable_type","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"premium_advanced","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20837","vulnerable":"1","versionEndIncluding":"6.3.11","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sixapart","cpe5":"movable_type","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20837","vulnerable":"1","versionEndIncluding":"6.8.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sixapart","cpe5":"movable_type","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20837","vulnerable":"1","versionEndIncluding":"6.8.2","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sixapart","cpe5":"movable_type","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"advanced","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20837","vulnerable":"1","versionEndIncluding":"7.8.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sixapart","cpe5":"movable_type","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"-","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"20837","vulnerable":"1","versionEndIncluding":"7.8.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sixapart","cpe5":"movable_type","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"advanced","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-20837","qid":"730870","title":"Movable Type XMLRPC API Remote Command Injection Vulnerability"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-20837","ASSIGNER":"vultures@jpcert.or.jp","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Six Apart Ltd.","product":{"product_data":[{"product_name":"Movable Type","version":{"version_data":[{"version_value":"Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"OS Command Injection"}]}]},"references":{"reference_data":[{"url":"https://movabletype.org/news/2021/10/mt-782-683-released.html","refsource":"MISC","name":"https://movabletype.org/news/2021/10/mt-782-683-released.html"},{"url":"https://jvn.jp/en/jp/JVN41119755/index.html","refsource":"MISC","name":"https://jvn.jp/en/jp/JVN41119755/index.html"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html","url":"http://packetstormsecurity.com/files/164705/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html","url":"http://packetstormsecurity.com/files/164818/Movable-Type-7-r.5002-XMLRPC-API-Remote-Command-Injection.html"}]},"description":{"description_data":[{"lang":"eng","value":"Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability."}]}},"nvd":{"publishedDate":"2021-10-26 06:15:00","lastModifiedDate":"2021-11-28 23:11:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sixapart:movable_type:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0","versionEndIncluding":"6.3.11","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sixapart:movable_type:*:*:*:*:-:*:*:*","versionStartIncluding":"6.5.0","versionEndIncluding":"6.8.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sixapart:movable_type:*:*:*:*:advanced:*:*:*","versionStartIncluding":"6.5.0","versionEndIncluding":"6.8.2","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sixapart:movable_type:*:*:*:*:-:*:*:*","versionStartIncluding":"7.0","versionEndIncluding":"7.8.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sixapart:movable_type:*:*:*:*:advanced:*:*:*","versionStartIncluding":"7.0","versionEndIncluding":"7.8.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sixapart:movable_type:*:*:*:*:premium:*:*:*","versionEndIncluding":"1.46","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sixapart:movable_type:*:*:*:*:premium_advanced:*:*:*","versionEndIncluding":"1.46","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"20837","Ordinal":"194882","Title":"CVE-2021-20837","CVE":"CVE-2021-20837","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"20837","Ordinal":"1","NoteData":"Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.46 and earlier, and Movable Type Premium Advanced 1.46 and earlier allow remote attackers to execute arbitrary OS commands via unspecified vectors. Note that all versions of Movable Type 4.0 or later including unsupported (End-of-Life, EOL) versions are also affected by this vulnerability.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"20837","Ordinal":"2","NoteData":"2021-10-26","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"20837","Ordinal":"3","NoteData":"2021-11-09","Type":"Other","Title":"Modified"}]}}}