Schlix CMS RCE (CVE-2021-47964) Exposes Servers to Authenticated Attackers
Schlix CMS 2.2.6-6 contains a critical remote code execution (RCE) vulnerability, tracked as CVE-2021-47964, according to the National Vulnerability Database. This flaw allows authenticated attackers to execute arbitrary PHP code. The attack vector leverages the block manager, where an attacker can upload a malicious extension package.
The exploit chain involves crafting a ZIP file with PHP code embedded within the packageinfo.inc file. Once this malicious extension is installed, merely accessing the ‘About’ tab of the new extension triggers code execution. The National Vulnerability Database rates this with a CVSS score of 8.8 (High), highlighting the severe impact of successful exploitation.
This vulnerability represents a significant risk for organizations running affected Schlix CMS versions. While it requires prior authentication, the ability to execute arbitrary code provides a full system compromise. Defenders need to understand that an attacker only needs valid credentials — which could be stolen, phished, or brute-forced — to achieve server-side RCE. The attacker’s calculus here is straightforward: gain initial access, then elevate to full control.
What This Means For You
- If your organization uses Schlix CMS 2.2.6-6 or earlier, you are exposed. Patch immediately. Audit your Schlix CMS instances for any unauthorized or suspicious extension installations, especially those installed via the block manager. Review access logs for unusual activity from authenticated users.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Schlix CMS Arbitrary PHP Code Upload - CVE-2021-47964
title: Schlix CMS Arbitrary PHP Code Upload - CVE-2021-47964
id: scw-2026-05-15-ai-1
status: experimental
level: critical
description: |
Detects the upload of a malicious extension package containing a 'packageinfo.inc' file, which is a key step in exploiting CVE-2021-47964 in Schlix CMS. This allows authenticated attackers to upload arbitrary PHP code.
author: SCW Feed Engine (AI-generated)
date: 2026-05-15
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2021-47964/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: file_event
detection:
selection:
TargetFilename|endswith:
- '/packageinfo.inc'
EventType: 'create'
selection_base:
TargetFilename|contains:
- '.zip'
condition: selection AND selection_base
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2021-47964 | RCE | Schlix CMS 2.2.6-6 |
| CVE-2021-47964 | RCE | Uploading malicious extension packages through the block manager |
| CVE-2021-47964 | RCE | Crafted ZIP file containing PHP code in packageinfo.inc |
| CVE-2021-47964 | RCE | Trigger execution by accessing the About tab of the installed extension |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 15, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.