PatchSiren cyber security CVE debrief
CVE-2021-47978 Exploit Db CVE debrief
CVE-2021-47978 describes a local file inclusion flaw in ProcessMaker 3.5.4 where improper path traversal validation can allow unauthenticated attackers to read arbitrary files. The supplied sources characterize the issue as a file-read problem that can expose sensitive system data, including files like /etc/passwd.
- Vendor
- Exploit Db
- Product
- Unknown
- CVSS
- MEDIUM 6.9
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-16
- Original CVE updated
- 2026-05-16
- Advisory published
- 2026-05-16
- Advisory updated
- 2026-05-16
Who should care
Organizations running ProcessMaker 3.5.4 or any deployment that may expose the affected file-handling path should care most. Security teams, application owners, and incident responders should also review any internet-facing or multi-user instances for exposure.
Technical summary
The record maps to CWE-98 and indicates insufficient validation of path traversal sequences in a file access path. An attacker does not need authentication, and the impact described in the supplied material is arbitrary local file disclosure rather than code execution or integrity loss.
Defensive priority
High for any exposed ProcessMaker 3.5.4 deployment; medium otherwise. Because the issue enables unauthenticated file disclosure, it should be prioritized alongside other externally reachable information-disclosure flaws, especially if the instance contains credentials, configuration files, or secrets.
Recommended defensive actions
- Confirm whether ProcessMaker 3.5.4 is deployed anywhere in your environment.
- Check vendor guidance and upgrade to a fixed version if one is available.
- Restrict exposure of ProcessMaker to trusted networks until remediation is complete.
- Review logs for requests containing directory traversal patterns or unusual file-access attempts.
- Inventory and rotate any secrets that may have been stored in files reachable from the affected application context.
- Validate that compensating controls such as network segmentation and authentication gateways are in place for all exposed instances.
Evidence notes
This debrief is based only on the supplied NVD record and the listed references. The source material identifies ProcessMaker 3.5.4, unauthenticated local file inclusion via path traversal, arbitrary file read impact, and CWE-98. No KEV entry was supplied, and no additional exploitation details are used beyond the provided references.
Official resources
Public-facing vulnerability record with supplied published/modified timestamp 2026-05-16T16:16:23.360Z. No KEV listing was supplied. References in the corpus include NVD/CVE.org, a VulnCheck advisory, ProcessMaker's website, and an Exploit-