{"api_version":"1","generated_at":"2026-04-23T08:40:07+00:00","cve":"CVE-2021-24347","urls":{"html":"https://cve.report/CVE-2021-24347","api":"https://cve.report/api/cve/CVE-2021-24347.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-24347","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-24347"},"summary":{"title":"CVE-2021-24347","description":"The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from \"php\" to \"pHP\".","state":"PUBLIC","assigner":"contact@wpscan.com","published_at":"2021-06-14 14:15:00","updated_at":"2022-11-09 03:54:00"},"problem_types":["CWE-178"],"metrics":[],"references":[{"url":"https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a","name":"https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a","refsource":"CONFIRM","tags":[],"title":"Attention Required! | Cloudflare","mime":"text/html","httpstatus":"403","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html","name":"http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html","refsource":"MISC","tags":[],"title":"WordPress SP Project And Document Manager 4.21 Shell Upload ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html","name":"http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html","refsource":"MISC","tags":[],"title":"WordPress SP Project And Document Remote Code Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-24347","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-24347","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Viktor Markopoulos","lang":""}],"nvd_cpes":[{"cve_year":"2021","cve_id":"24347","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"smartypantsplugins","cpe5":"sp_project_\\&_document_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ID":"CVE-2021-24347","ASSIGNER":"contact@wpscan.com","STATE":"PUBLIC","TITLE":"SP Project & Document Manager <2 4.22 - Authenticated Shell Upload"},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","generator":"WPScan CVE Generator","affects":{"vendor":{"vendor_data":[{"vendor_name":"Unknown","product":{"product_data":[{"product_name":"SP Project & Document Manager","version":{"version_data":[{"version_affected":"<","version_name":"4.22","version_value":"4.22"}]}}]}}]}},"description":{"description_data":[{"lang":"eng","value":"The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from \"php\" to \"pHP\"."}]},"references":{"reference_data":[{"refsource":"CONFIRM","url":"https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a","name":"https://wpscan.com/vulnerability/8f6e82d5-c0e9-468e-acb8-7cd549f6a45a"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html","url":"http://packetstormsecurity.com/files/163434/WordPress-SP-Project-And-Document-Manager-4.21-Shell-Upload.html"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html","url":"http://packetstormsecurity.com/files/163675/WordPress-SP-Project-And-Document-Remote-Code-Execution.html"}]},"problemtype":{"problemtype_data":[{"description":[{"value":"CWE-178 Improper Handling of Case Sensitivity","lang":"eng"}]}]},"credit":[{"lang":"eng","value":"Viktor Markopoulos"}],"source":{"discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-06-14 14:15:00","lastModifiedDate":"2022-11-09 03:54:00","problem_types":["CWE-178"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:smartypantsplugins:sp_project_\\&_document_manager:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"4.22","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"24347","Ordinal":"199109","Title":"CVE-2021-24347","CVE":"CVE-2021-24347","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"24347","Ordinal":"1","NoteData":"The SP Project & Document Manager WordPress plugin before 4.22 allows users to upload files, however, the plugin attempts to prevent php and other similar files that could be executed on the server from being uploaded by checking the file extension. It was discovered that php files could still be uploaded by changing the file extension's case, for example, from \"php\" to \"pHP\".","Type":"Description","Title":null},{"CveYear":"2021","CveId":"24347","Ordinal":"2","NoteData":"2021-06-14","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"24347","Ordinal":"3","NoteData":"2021-07-26","Type":"Other","Title":"Modified"}]}}}