{"id":"CVE-2021-46114","details":"jpress v 4.2.0 is vulnerable to RCE via io.jpress.module.product.ProductNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.","modified":"2026-04-12T03:55:59.397801Z","published":"2022-01-26T19:15:08.290Z","references":[{"type":"ADVISORY","url":"http://jpress.com"},{"type":"REPORT","url":"https://github.com/JPressProjects/jpress/issues/172"},{"type":"PACKAGE","url":"https://github.com/JPressProjects/jpress"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jpressprojects/jpress","events":[{"introduced":"0"},{"last_affected":"2e3e8f376a26c1fa98c8d4ecb346d02e26ecb10b"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"4.2.0"}],"cpe":"cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["0.0.1","0.0.2","0.0.3","0.1","0.2","0.2.1","0.2.2","0.2.3","0.2.4","0.2.5","0.2.6","0.2.7","0.3.0","0.4.0","v1.0","v1.0-beta1","v1.0-beta2","v1.0-beta3","v1.0-rc.10","v1.0-rc.3","v1.0-rc.4","v1.0-rc.5","v1.0-rc.6","v1.0-rc.7","v1.0-rc.8","v1.0-rc.9","v1.0-rc1","v1.0-rc2","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v2.0-rc.6","v2.0-rc.7","v2.0-rc.8","v2.0-rc.9","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.0.7","v2.0.8","v3.0-rc.1","v3.0.0","v3.0.0-alpha.1","v3.0.0-alpha.2","v3.0.0-beta.1","v3.0.0-beta.2","v3.0.0-rc.2","v3.0.0-rc.3","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v3.0.5","v3.0.6","v3.1.0","v3.1.1","v3.2.0","v3.2.1","v3.2.2","v3.2.3","v3.2.4","v3.2.5","v3.3.0","v4.0.0","v4.0.0-rc.1","v4.0.0-rc.2","v4.0.1","v4.0.2","v4.0.3","v4.0.4","v4.0.5","v4.0.6","v4.0.8","v4.0.9","v4.1.0","v4.1.1","v4.1.2","v4.1.3","v4.1.4","v4.1.5","v4.2.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-46114.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}