CVE-2021-1627

Source
https://cve.org/CVERecord?id=CVE-2021-1627
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-1627.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-1627
Published
2021-03-26T17:15:12.640Z
Modified
2026-04-11T23:13:58.995171Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

MuleSoft is aware of a Server Side Request Forgery vulnerability affecting certain versions of a Mule runtime component that may affect both CloudHub and on-premise customers. This affects: Mule 3.8.x,3.9.x,4.x runtime released before February 2, 2021.

References

Affected packages

Git / github.com/mulesoft/mule

Affected ranges

Type
GIT
Repo
https://github.com/mulesoft/mule
Events
Database specific
{
    "cpe": "cpe:2.3:a:salesforce:mule:*:*:*:*:*:*:*:*",
    "source": "CPE_FIELD",
    "extracted_events": [
        {
            "introduced": "3.8.0"
        },
        {
            "last_affected": "4.2.2"
        }
    ]
}

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-1627.json"