CVE-2021-21307

Missing Authorization in Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development

Verified by Precogs Threat Research
Last Updated: Nov 21, 2024
Base Score
8.6HIGH

Executive Summary

CVE-2021-21307 is a high severity vulnerability affecting api-security. It is classified as Missing Authorization. Ensure your systems and dependencies are patched immediately to mitigate exposure risks.

Precogs AI Insight

"Lucee Server contains an unauthenticated remote code execution vulnerability. Attackers exploit a flaw in the CFML parsing engine or administrative interface to execute arbitrary Java code on the server. Precogs API Security Engine identifies unsafe object deserialization and dynamic code execution pathways."

Exploit Probability (EPSS)
High (92.1%)
Public POC
Undisclosed
Exploit Probability
Elevated (52%)
Public POC
Available
Affected Assets
api securityCWE-862

What is this vulnerability?

CVE-2021-21307 is categorized as a high Missing Authorization flaw with a CVSS base score of 8.6. Based on our vulnerability intelligence, this issue occurs when the application fails to securely handle untrusted data boundaries.

Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development. In Lucee Admin before versions 5.3.7.47, 5.3.6.68 or 5.3.5.96 there is an unauthenticated remote code exploit. This is fixed in versions 5.3.7.47, 5.3.6.68 or 5.3.5.96. As a workaround, one can block access to the Lucee Administrator.

This architectural defect enables adversaries to bypass intended security controls, directly manipulating the application's execution state or data layer. Immediate strategic intervention is required.

Risk Assessment

MetricValue
CVSS Base Score8.6 (HIGH)
Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
PublishedFebruary 11, 2021
Last ModifiedNovember 21, 2024
Related CWEsCWE-862

Impact on Systems

Unauthorized Data Access: Attackers can bypass authorization controls to access other users' data or administrative endpoints.

Account Takeover: Broken authentication or authorization may enable full account compromise without valid credentials.

API Abuse: Exploiting this vulnerability enables mass data harvesting or destructive operations through unprotected API endpoints.

How to Fix and Mitigate CVE-2021-21307

  1. Apply Vendor Patches: Upgrade affected components to their latest, non-vulnerable versions immediately.
  2. Implement Input Validation: Ensure all user-supplied data is validated, sanitized, and type-checked before processing.
  3. Deploy Runtime Protection: Use Precogs continuous monitoring to detect exploitation attempts in real time.
  4. Audit Dependencies: Review and update all third-party libraries and transitive dependencies.

Defending with Precogs AI

Lucee Server contains an unauthenticated remote code execution vulnerability. Attackers exploit a flaw in the CFML parsing engine or administrative interface to execute arbitrary Java code on the server. Precogs API Security Engine identifies unsafe object deserialization and dynamic code execution pathways.

Use Precogs to continuously scan your codebase, binaries, APIs, and infrastructure for this vulnerability class and related attack patterns. Our AI-powered detection engine combines static analysis with threat intelligence to identify exploitable weaknesses before attackers do.

Start scanning with Precogs →

Vulnerability Code Signature

Attack Data Flow

StageDetail
SourceAPI Endpoint (REST/GraphQL)
VectorMissing or flawed authorization checks on the requested resource
SinkDirect interaction with database or internal microservice
ImpactUnauthorized data access, BOLA/IDOR, Account Takeover

Vulnerable Code Pattern

// ❌ VULNERABLE: Missing Authorization (BOLA)
app.get('/api/users/:id/data', async (req, res) => {
  const userId = req.params.id;
  // Taint sink: fetches data for requested ID without verifying ownership
  const data = await db.getUserData(userId);
  res.json(data);
});

Secure Code Pattern

// ✅ SECURE: Strict Resource Authorization
app.get('/api/users/:id/data', requireAuth, async (req, res) => {
  const requestedId = req.params.id;
  const authenticatedId = req.user.id;
  
  // Sanitized validation: check ownership
  if (requestedId !== authenticatedId && !req.user.isAdmin) {
    return res.status(403).json({ error: "Unauthorized access" });
  }
  
  const data = await db.getUserData(requestedId);
  res.json(data);
});

How Precogs Detects This

Precogs API Security Engine comprehensively audits all exposed endpoints to guarantee strict session validation and resource authorization.\n

Related Vulnerabilitiesvia CWE-862

CVE-2026-340537.1 HIGH

Missing Authorization in OpenEMR AJAX endpoint 'handle_deletions.php' before 8.0.0.3. Allows any authenticated user to irreversibly delete procedure orders and specimens for any patient.

CWE-862
CVE-2026-42618.8 HIGH

The Expire Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.

CWE-862
CVE-2026-36515.3 MEDIUM

The Build App Online plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 1.

CWE-862
CVE-2026-36455.3 MEDIUM

The Punnel – Landing Page Builder plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.

CWE-862
CVE-2026-33355.3 MEDIUM

The Canto plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.

CWE-862
CVE-2026-29418.8 HIGH

The Linksy Search and Replace plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'linksy_search_and_replace_item_details' function in all versions up to, and including, 1.

CWE-862

Is your system affected?

Precogs AI detects CVE-2021-21307 in compiled binaries, LLMs, and application layers — even without source code access.