{"api_version":"1","generated_at":"2026-04-22T20:07:36+00:00","cve":"CVE-2021-41279","urls":{"html":"https://cve.report/CVE-2021-41279","api":"https://cve.report/api/cve/CVE-2021-41279.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-41279","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-41279"},"summary":{"title":"CVE-2021-41279","description":"BaserCMS is an open source content management system with a focus on Japanese language support. In affected versions users with upload privilege may upload crafted zip files capable of path traversal on the host operating system. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2021-11-26 18:15:00","updated_at":"2021-11-30 17:05:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://github.com/baserproject/basercms/commit/d8ab0a81a7bce35cc95ff7dff851a7e87a084336","name":"https://github.com/baserproject/basercms/commit/d8ab0a81a7bce35cc95ff7dff851a7e87a084336","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-4x2f-54wr-4hjg · baserproject/basercms@d8ab0a8 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/baserproject/basercms/security/advisories/GHSA-4x2f-54wr-4hjg","name":"https://github.com/baserproject/basercms/security/advisories/GHSA-4x2f-54wr-4hjg","refsource":"CONFIRM","tags":[],"title":"Potential Zip Slip Vulnerability · Advisory · baserproject/basercms · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-41279","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-41279","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"41279","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"basercms","cpe5":"basercms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2021-41279","STATE":"PUBLIC","TITLE":"Zip Slip Vulnerability in BaserCMS"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"basercms","version":{"version_data":[{"version_value":"< 4.5.3"}]}}]},"vendor_name":"baserproject"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"BaserCMS is an open source content management system with a focus on Japanese language support. In affected versions users with upload privilege may upload crafted zip files capable of path traversal on the host operating system. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}]},"references":{"reference_data":[{"name":"https://github.com/baserproject/basercms/security/advisories/GHSA-4x2f-54wr-4hjg","refsource":"CONFIRM","url":"https://github.com/baserproject/basercms/security/advisories/GHSA-4x2f-54wr-4hjg"},{"name":"https://github.com/baserproject/basercms/commit/d8ab0a81a7bce35cc95ff7dff851a7e87a084336","refsource":"MISC","url":"https://github.com/baserproject/basercms/commit/d8ab0a81a7bce35cc95ff7dff851a7e87a084336"}]},"source":{"advisory":"GHSA-4x2f-54wr-4hjg","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2021-11-26 18:15:00","lastModifiedDate":"2021-11-30 17:05:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":9},"severity":"HIGH","exploitabilityScore":8,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.4","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"41279","Ordinal":"216976","Title":"CVE-2021-41279","CVE":"CVE-2021-41279","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"41279","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}