{"api_version":"1","generated_at":"2026-04-14T12:33:34+00:00","cve":"CVE-2021-23258","urls":{"html":"https://cve.report/CVE-2021-23258","api":"https://cve.report/api/cve/CVE-2021-23258.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-23258","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-23258"},"summary":{"title":"CVE-2021-23258","description":"Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE).","state":"PUBLIC","assigner":"security@craftersoftware.com","published_at":"2021-12-02 16:15:00","updated_at":"2021-12-03 18:17:00"},"problem_types":["CWE-913"],"metrics":[],"references":[{"url":"https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101","name":"https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101","refsource":"MISC","tags":[],"title":"Security Advisories — Crafter CMS 3.1.14 documentation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-23258","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23258","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Kai Zhao (ToTU Security Team)","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"23258","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"craftercms","cpe5":"crafter_cms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@craftersoftware.com","DATE_PUBLIC":"2021-12-01T15:40:00.000Z","ID":"CVE-2021-23258","STATE":"PUBLIC","TITLE":"Spring SPEL Expression Language Injection"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Crafter CMS","version":{"version_data":[{"version_affected":"<","version_name":"3.1","version_value":"3.1.12"}]}}]},"vendor_name":"Crafter Software"}]}},"credit":[{"lang":"eng","value":"Kai Zhao (ToTU Security Team)"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE)."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":4.2,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-913 Improper Control of Dynamically-Managed Code Resources"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101","name":"https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2021120101"}]},"source":{"discovery":"EXTERNAL"}},"nvd":{"publishedDate":"2021-12-02 16:15:00","lastModifiedDate":"2021-12-03 18:17:00","problem_types":["CWE-913"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:craftercms:crafter_cms:*:*:*:*:*:*:*:*","versionStartIncluding":"3.1.0","versionEndExcluding":"3.1.12","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"23258","Ordinal":"197984","Title":"CVE-2021-23258","CVE":"CVE-2021-23258","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"23258","Ordinal":"1","NoteData":"Authenticated users with Administrator or Developer roles may execute OS commands by SPEL Expression in Spring beans. SPEL Expression does not have security restrictions, which will cause attackers to execute arbitrary commands remotely (RCE).","Type":"Description","Title":null},{"CveYear":"2021","CveId":"23258","Ordinal":"2","NoteData":"2021-12-02","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"23258","Ordinal":"3","NoteData":"2021-12-02","Type":"Other","Title":"Modified"}]}}}