CVE-2021-29465

Remote file overwrite on discord-recon can result in DoS and Remote Code Execution

Description

Discord-Recon is a bot for the Discord chat service. Versions of Discord-Recon 0.0.3 and prior contain a vulnerability in which a remote attacker is able to overwrite any file on the system with the command results. This can result in remote code execution when the user overwrite important files on the system. As a workaround, bot maintainers can edit their `setting.py` file then add `<` and `>` into the `RCE` variable inside of it to fix the issue without an update. The vulnerability is patched in version 0.0.4.

Categories

8.3
CVSS
Severity: High
CVSS 3.1 •
CVSS 2.0 •
EPSS 3.68% Top 15%
Third-Party Advisory github.com
Affected: DEMON1A Discord-Recon
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2021-29465?
CVE-2021-29465 has been scored as a high severity vulnerability.
How to fix CVE-2021-29465?
To fix CVE-2021-29465, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2021-29465 being actively exploited in the wild?
It is possible that CVE-2021-29465 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~4% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2021-29465?
CVE-2021-29465 affects DEMON1A Discord-Recon.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.