CVE-2022-0072: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in LiteSpeed Technologies OpenLiteSpeed Web Server
Directory Traversal vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards allows Path Traversal. This affects versions from 1.5.11 through 1.5.12, from 1.6.5 through 1.6.20.1, from 1.7.0 before 1.7.16.1
AI Analysis
Technical Summary
CVE-2022-0072 is a directory traversal vulnerability (CWE-22) affecting LiteSpeed Technologies' OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards. The flaw exists in versions 1.5.11 through 1.5.12, 1.6.5 through 1.6.20.1, and 1.7.0 before 1.7.16.1. This vulnerability allows an unauthenticated remote attacker to manipulate pathname inputs to access files and directories outside the intended restricted directory. The vulnerability arises from improper limitation of pathname traversal sequences, such as '../', enabling attackers to read arbitrary files on the server. The CVSS v3.1 base score is 5.8 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), scope changed (S:C), confidentiality impact low (C:L), and no impact on integrity or availability (I:N/A:N). Exploitation does not require authentication or user interaction, increasing the risk of automated attacks. Although no known exploits are reported in the wild, the vulnerability could be leveraged to access sensitive configuration files, credentials, or other data that could facilitate further compromise. The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire server environment. The lack of patches linked in the provided data suggests that users should verify the availability of vendor updates and apply them promptly to remediate the issue.
Potential Impact
For European organizations using OpenLiteSpeed Web Server, this vulnerability poses a risk of unauthorized disclosure of sensitive information stored on web servers. Attackers exploiting this flaw could access configuration files, source code, or other sensitive data, potentially leading to further attacks such as credential theft, privilege escalation, or lateral movement within networks. Given that OpenLiteSpeed is used in various hosting environments, including small to medium enterprises and web hosting providers, the impact could extend to customer data confidentiality and service trustworthiness. The medium severity score reflects a moderate risk; however, the lack of required privileges and user interaction increases the likelihood of exploitation. Organizations handling personal data under GDPR must consider the potential for data breaches and the associated regulatory and reputational consequences. Additionally, compromised web servers can be leveraged as footholds for broader attacks against internal networks or supply chains, amplifying the threat to European entities.
Mitigation Recommendations
European organizations should immediately identify all instances of OpenLiteSpeed Web Server in their environments and verify the version in use. Applying the latest vendor patches or updates that address CVE-2022-0072 is the primary mitigation step. If patches are not yet available, organizations should implement strict access controls to limit exposure of the web server dashboards and restrict access to trusted IP addresses only. Web application firewalls (WAFs) should be configured to detect and block directory traversal patterns in HTTP requests. Regularly auditing server logs for suspicious path traversal attempts can help in early detection of exploitation attempts. Additionally, organizations should ensure that sensitive files and directories are not accessible by the web server user and that file system permissions follow the principle of least privilege. Network segmentation can limit the impact of a compromised web server. Finally, organizations should monitor threat intelligence sources for any emerging exploit code or attack campaigns related to this vulnerability to adjust defenses accordingly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2022-0072: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in LiteSpeed Technologies OpenLiteSpeed Web Server
Description
Directory Traversal vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards allows Path Traversal. This affects versions from 1.5.11 through 1.5.12, from 1.6.5 through 1.6.20.1, from 1.7.0 before 1.7.16.1
AI-Powered Analysis
Technical Analysis
CVE-2022-0072 is a directory traversal vulnerability (CWE-22) affecting LiteSpeed Technologies' OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards. The flaw exists in versions 1.5.11 through 1.5.12, 1.6.5 through 1.6.20.1, and 1.7.0 before 1.7.16.1. This vulnerability allows an unauthenticated remote attacker to manipulate pathname inputs to access files and directories outside the intended restricted directory. The vulnerability arises from improper limitation of pathname traversal sequences, such as '../', enabling attackers to read arbitrary files on the server. The CVSS v3.1 base score is 5.8 (medium severity), with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), scope changed (S:C), confidentiality impact low (C:L), and no impact on integrity or availability (I:N/A:N). Exploitation does not require authentication or user interaction, increasing the risk of automated attacks. Although no known exploits are reported in the wild, the vulnerability could be leveraged to access sensitive configuration files, credentials, or other data that could facilitate further compromise. The scope change indicates that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire server environment. The lack of patches linked in the provided data suggests that users should verify the availability of vendor updates and apply them promptly to remediate the issue.
Potential Impact
For European organizations using OpenLiteSpeed Web Server, this vulnerability poses a risk of unauthorized disclosure of sensitive information stored on web servers. Attackers exploiting this flaw could access configuration files, source code, or other sensitive data, potentially leading to further attacks such as credential theft, privilege escalation, or lateral movement within networks. Given that OpenLiteSpeed is used in various hosting environments, including small to medium enterprises and web hosting providers, the impact could extend to customer data confidentiality and service trustworthiness. The medium severity score reflects a moderate risk; however, the lack of required privileges and user interaction increases the likelihood of exploitation. Organizations handling personal data under GDPR must consider the potential for data breaches and the associated regulatory and reputational consequences. Additionally, compromised web servers can be leveraged as footholds for broader attacks against internal networks or supply chains, amplifying the threat to European entities.
Mitigation Recommendations
European organizations should immediately identify all instances of OpenLiteSpeed Web Server in their environments and verify the version in use. Applying the latest vendor patches or updates that address CVE-2022-0072 is the primary mitigation step. If patches are not yet available, organizations should implement strict access controls to limit exposure of the web server dashboards and restrict access to trusted IP addresses only. Web application firewalls (WAFs) should be configured to detect and block directory traversal patterns in HTTP requests. Regularly auditing server logs for suspicious path traversal attempts can help in early detection of exploitation attempts. Additionally, organizations should ensure that sensitive files and directories are not accessible by the web server user and that file system permissions follow the principle of least privilege. Network segmentation can limit the impact of a compromised web server. Finally, organizations should monitor threat intelligence sources for any emerging exploit code or attack campaigns related to this vulnerability to adjust defenses accordingly.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- palo_alto
- Date Reserved
- 2021-12-28T23:57:03.295Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd7442
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/4/2025, 11:57:06 PM
Last updated: 2/7/2026, 1:02:09 PM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.