{"vulnerability": "CVE-2021-32682", "sightings": [{"uuid": "dfaca1ca-b25f-4a71-b8e3-58fd2e4e2ff7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32682", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:45.000000Z"}, {"uuid": "786f874f-6f84-4977-ac83-dfc740ebccd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32682", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/elfinder_archive_cmd_injection.rb", "content": "", "creation_timestamp": "2021-09-14T18:27:38.000000Z"}, {"uuid": "554550e9-9803-4415-acf7-0f7f4ff49c68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-32682", "type": "seen", "source": "https://mastodon.social/users/hrbrmstr/statuses/115622598869162877", "content": "", "creation_timestamp": "2025-11-27T16:27:31.635790Z"}, {"uuid": "16605576-bd20-4103-baaa-c5bf5e1e1a4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32682", "type": "seen", "source": "https://t.me/cKure/6873", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 Vulnerabilities Detected in Open Source elFinder File Manager.\n\nThe five flaws, termed CVE-2021-32682 as a group, have a CVSS score of 9.8, which means they're highly dangerous. The vulnerability chain impacts elFinder version 2.1.58.\n\nhttps://www.ehackingnews.com/2021/08/vulnerabilities-detected-in-open-source.html", "creation_timestamp": "2021-08-30T20:03:05.000000Z"}, {"uuid": "35e34e49-2244-4650-83af-ead8607c2b79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32682", "type": "seen", "source": "https://t.me/arpsyndicate/85", "content": "#ExploitObserverAlert\n\nCVE-2021-32682\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2021-32682. elFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.\n\nFIRST-EPSS: 0.972800000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-11T05:05:19.000000Z"}, {"uuid": "a744d6c4-2407-4711-92c5-a78512c1675b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32682", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:37.000000Z"}, {"uuid": "adb8948f-f68b-4f8d-b498-20f1486a16d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2021-32682", "type": "seen", "source": "https://bsky.app/profile/hrbrmstr.mastodon.social.ap.brid.gy/post/3m6ms6jjxg4z2", "content": "", "creation_timestamp": "2025-11-27T16:32:26.615931Z"}, {"uuid": "b9505430-c5bc-4bdd-a3e9-77ce48810f48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32682", "type": "seen", "source": "https://t.me/cibsecurity/25440", "content": "\u203c CVE-2021-32682 \u203c\n\nelFinder is an open-source file manager for web, written in JavaScript using jQuery UI. Several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with minimal configuration. The issues were patched in version 2.1.59. As a workaround, ensure the connector is not exposed without authentication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-14T20:37:46.000000Z"}, {"uuid": "92d1effb-23b8-4b0d-9508-dd920d70cd1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32682", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/4133", "content": "#Threat_Research\n1. CVE-2021-32682, CVE-2021-23394:\nWrite-up of several pre-auth RCEs in elFinder &lt; 2.1.59\nhttps://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities\n2. CVE-2021-30656:\nApple iOS/iPadOS GPU Drivers information disclosure\nhttps://jsherman212.github.io/CVE-2021-30656", "creation_timestamp": "2021-08-23T12:07:01.000000Z"}]}