Privilege Escalation Vulnerability in OpenBMCS by OpenBMCS
CVE-2021-47701

8.7HIGH

Key Information:

Vendor

Open Bmcs

Status
Vendor
CVE Published:
9 December 2025

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2021-47701?

OpenBMCS 2.4 presents a vulnerability that allows attackers to escalate their privileges from a read-only user to an admin user. This can be accomplished by exploiting the permissions in the update_user_permissions.php script. By sending a specially crafted HTTP POST request to the PHP scripts located in the '/plugins/useradmin/' directory, malicious users can manipulate user permissions, potentially compromising the entire system and accessing sensitive administrative functionalities.

Affected Version(s)

OpenBMCS 2.4

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

LiquidWorm as Gjoko Krstic of Zero Science Lab
.
CVE-2021-47701 : Privilege Escalation Vulnerability in OpenBMCS by OpenBMCS