CVE-2021-21307

Remote Code Exploit in Lucee Admin

Basic Information

CVE State
PUBLISHED
Reserved Date
December 22, 2020
Published Date
February 11, 2021
Last Updated
August 03, 2024
Vendor
lucee
Product
Lucee
Description
Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development. In Lucee Admin before versions 5.3.7.47, 5.3.6.68 or 5.3.5.96 there is an unauthenticated remote code exploit. This is fixed in versions 5.3.7.47, 5.3.6.68 or 5.3.5.96. As a workaround, one can block access to the Lucee Administrator.
Tags
nuclei_scanner metasploit_scanner

CVSS Scores

CVSS v3.1

8.6 - HIGH

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N

EPSS Score

Score
92.97% (Percentile: 99.76%) as of 2025-05-20

Exploit Status

Exploited in the Wild
Yes (2025-04-22 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-04-22 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

lucee_admin_imgprocess_file_write

Type: metasploit • Created: Unknown

Metasploit module for CVE-2021-21307

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Added to KEVIntel

  • Detected by Nuclei

  • Detected by Metasploit