PatchSiren

PatchSiren cyber security CVE debrief

CVE-2021-47978 Exploit Db CVE debrief

CVE-2021-47978 describes a local file inclusion flaw in ProcessMaker 3.5.4 where improper path traversal validation can allow unauthenticated attackers to read arbitrary files. The supplied sources characterize the issue as a file-read problem that can expose sensitive system data, including files like /etc/passwd.

Vendor
Exploit Db
Product
Unknown
CVSS
MEDIUM 6.9
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-16
Original CVE updated
2026-05-16
Advisory published
2026-05-16
Advisory updated
2026-05-16

Who should care

Organizations running ProcessMaker 3.5.4 or any deployment that may expose the affected file-handling path should care most. Security teams, application owners, and incident responders should also review any internet-facing or multi-user instances for exposure.

Technical summary

The record maps to CWE-98 and indicates insufficient validation of path traversal sequences in a file access path. An attacker does not need authentication, and the impact described in the supplied material is arbitrary local file disclosure rather than code execution or integrity loss.

Defensive priority

High for any exposed ProcessMaker 3.5.4 deployment; medium otherwise. Because the issue enables unauthenticated file disclosure, it should be prioritized alongside other externally reachable information-disclosure flaws, especially if the instance contains credentials, configuration files, or secrets.

Recommended defensive actions

  • Confirm whether ProcessMaker 3.5.4 is deployed anywhere in your environment.
  • Check vendor guidance and upgrade to a fixed version if one is available.
  • Restrict exposure of ProcessMaker to trusted networks until remediation is complete.
  • Review logs for requests containing directory traversal patterns or unusual file-access attempts.
  • Inventory and rotate any secrets that may have been stored in files reachable from the affected application context.
  • Validate that compensating controls such as network segmentation and authentication gateways are in place for all exposed instances.

Evidence notes

This debrief is based only on the supplied NVD record and the listed references. The source material identifies ProcessMaker 3.5.4, unauthenticated local file inclusion via path traversal, arbitrary file read impact, and CWE-98. No KEV entry was supplied, and no additional exploitation details are used beyond the provided references.

Official resources

Public-facing vulnerability record with supplied published/modified timestamp 2026-05-16T16:16:23.360Z. No KEV listing was supplied. References in the corpus include NVD/CVE.org, a VulnCheck advisory, ProcessMaker's website, and an Exploit-