{"id":"CVE-2020-21325","details":"An issue in WUZHI CMS v.4.1.0 allows a remote attacker to execute arbitrary code via the set_chache method of the function\\common.func.php file.","modified":"2026-04-11T20:35:56.397722Z","published":"2023-06-20T15:15:11.210Z","references":[{"type":"REPORT","url":"https://github.com/wuzhicms/wuzhicms/issues/188"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wuzhicms/wuzhicms","events":[{"introduced":"0"},{"last_affected":"0a9144f8da632bbf69d53e4126bc2b6c0b08ee0d"}],"database_specific":{"cpe":"cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"4.1.0"}]}}],"versions":["v2.0.1","v2.0.4","v2.0.5","v2.1.2","v2.1.3","v2.1.6","v2.1.7","v3.0.1","v3.0.3","v3.0.3.0","v3.0.4","v3.0.4.0","v3.1.0","v3.1.0.1","v3.1.0.2","v3.1.1","v3.1.2","v3.1.3","v4.0.0","v4.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-21325.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}