๐Ÿ” CVE Alert

CVE-2021-47900

CRITICAL 9.8

Gila CMS < 2.0.0 - Remote Code Execution

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

Gila CMS versions prior to 2.0.0 contain a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands through manipulated HTTP headers. Attackers can inject PHP code in the User-Agent header with shell_exec() to run system commands by sending crafted requests to the admin endpoint.

CWE CWE-98
Vendor gila cms
Product gila cms
Published Jan 27, 2026
Last Updated Mar 5, 2026
Stay Ahead of the Next One

Get instant alerts for gila cms gila cms

Be the first to know when new critical vulnerabilities affecting gila cms gila cms are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Gila CMS / Gila CMS
0 < 2.0.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/49412 gilacms.com: https://gilacms.com/ github.com: https://github.com/GilaCMS/gila vulncheck.com: https://www.vulncheck.com/advisories/gila-cms-remote-code-execution

Credits

Enesdex