{"id":"CVE-2021-46117","details":"jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.page.PageNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.","modified":"2026-04-10T04:41:50.508015Z","published":"2022-01-26T16:15:07.613Z","references":[{"type":"WEB","url":"http://jpress.com"},{"type":"PACKAGE","url":"https://github.com/JPressProjects/jpress"},{"type":"EVIDENCE","url":"https://github.com/JPressProjects/jpress/issues/171"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/jpressprojects/jpress","events":[{"introduced":"0"},{"last_affected":"2e3e8f376a26c1fa98c8d4ecb346d02e26ecb10b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"4.2.0"}]}}],"versions":["0.0.1","0.0.2","0.0.3","0.1","0.2","0.2.1","0.2.2","0.2.3","0.2.4","0.2.5","0.2.6","0.2.7","0.3.0","0.4.0","v1.0","v1.0-beta1","v1.0-beta2","v1.0-beta3","v1.0-rc.10","v1.0-rc.3","v1.0-rc.4","v1.0-rc.5","v1.0-rc.6","v1.0-rc.7","v1.0-rc.8","v1.0-rc.9","v1.0-rc1","v1.0-rc2","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v2.0-rc.6","v2.0-rc.7","v2.0-rc.8","v2.0-rc.9","v2.0.1","v2.0.2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.0.7","v2.0.8","v3.0-rc.1","v3.0.0","v3.0.0-alpha.1","v3.0.0-alpha.2","v3.0.0-beta.1","v3.0.0-beta.2","v3.0.0-rc.2","v3.0.0-rc.3","v3.0.1","v3.0.2","v3.0.3","v3.0.4","v3.0.5","v3.0.6","v3.1.0","v3.1.1","v3.2.0","v3.2.1","v3.2.2","v3.2.3","v3.2.4","v3.2.5","v3.3.0","v4.0.0","v4.0.0-rc.1","v4.0.0-rc.2","v4.0.1","v4.0.2","v4.0.3","v4.0.4","v4.0.5","v4.0.6","v4.0.8","v4.0.9","v4.1.0","v4.1.1","v4.1.2","v4.1.3","v4.1.4","v4.1.5","v4.2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-46117.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}