CVE-2022-0074: CWE-426 Untrusted Search Path in LiteSpeed Technologies OpenLiteSpeed Web Server
Untrusted Search Path vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server Container allows Privilege Escalation. This affects versions from 1.6.15 before 1.7.16.1.
AI Analysis
Technical Summary
CVE-2022-0074 is a high-severity vulnerability classified under CWE-426 (Untrusted Search Path) affecting LiteSpeed Technologies' OpenLiteSpeed Web Server and LiteSpeed Web Server Container versions from 1.6.15 up to but not including 1.7.16.1. The vulnerability arises due to the web server's improper handling of executable search paths, allowing an attacker with limited privileges (PR:L) to escalate their privileges on the affected system. Specifically, the untrusted search path means that the server may execute malicious binaries placed in directories that are searched before the legitimate ones, leading to privilege escalation without requiring user interaction (UI:N). The CVSS 3.1 base score of 8.8 reflects the critical impact on confidentiality, integrity, and availability (all rated high), with network attack vector (AV:N), low attack complexity (AC:L), and no user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk because it can be exploited remotely by authenticated users to gain elevated privileges, potentially leading to full system compromise. The lack of patch links suggests that users must verify updates directly from LiteSpeed Technologies or their distribution channels to remediate this issue.
Potential Impact
For European organizations, this vulnerability presents a substantial risk, especially for those relying on OpenLiteSpeed Web Server for hosting web applications or services. Successful exploitation could allow attackers to escalate privileges from a low-privileged user to root or administrative levels, enabling unauthorized access to sensitive data, modification or deletion of critical files, and disruption of web services. This could lead to data breaches, service outages, and compliance violations under regulations such as GDPR. Given the network-exploitable nature and high impact on confidentiality, integrity, and availability, organizations face risks including data theft, defacement, ransomware deployment, or lateral movement within their networks. The vulnerability is particularly concerning for cloud-hosted environments and containerized deployments using the affected LiteSpeed Web Server Container, where privilege escalation can compromise entire container hosts or orchestrated clusters.
Mitigation Recommendations
European organizations should immediately verify their OpenLiteSpeed Web Server versions and upgrade to version 1.7.16.1 or later where the vulnerability is patched. In the absence of an official patch, organizations should implement strict path environment controls to ensure that the server only executes binaries from trusted directories. This includes sanitizing PATH variables, removing write permissions for unprivileged users on directories included in the search path, and employing application whitelisting where possible. Additionally, running the web server with the least privileges necessary and isolating it within containers or virtual machines can limit the blast radius of a potential exploit. Regular auditing of system binaries and monitoring for anomalous execution patterns or privilege escalations should be enforced. Network-level protections such as firewall rules restricting access to the management interfaces and multi-factor authentication for administrative access can further reduce risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland
CVE-2022-0074: CWE-426 Untrusted Search Path in LiteSpeed Technologies OpenLiteSpeed Web Server
Description
Untrusted Search Path vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server Container allows Privilege Escalation. This affects versions from 1.6.15 before 1.7.16.1.
AI-Powered Analysis
Technical Analysis
CVE-2022-0074 is a high-severity vulnerability classified under CWE-426 (Untrusted Search Path) affecting LiteSpeed Technologies' OpenLiteSpeed Web Server and LiteSpeed Web Server Container versions from 1.6.15 up to but not including 1.7.16.1. The vulnerability arises due to the web server's improper handling of executable search paths, allowing an attacker with limited privileges (PR:L) to escalate their privileges on the affected system. Specifically, the untrusted search path means that the server may execute malicious binaries placed in directories that are searched before the legitimate ones, leading to privilege escalation without requiring user interaction (UI:N). The CVSS 3.1 base score of 8.8 reflects the critical impact on confidentiality, integrity, and availability (all rated high), with network attack vector (AV:N), low attack complexity (AC:L), and no user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk because it can be exploited remotely by authenticated users to gain elevated privileges, potentially leading to full system compromise. The lack of patch links suggests that users must verify updates directly from LiteSpeed Technologies or their distribution channels to remediate this issue.
Potential Impact
For European organizations, this vulnerability presents a substantial risk, especially for those relying on OpenLiteSpeed Web Server for hosting web applications or services. Successful exploitation could allow attackers to escalate privileges from a low-privileged user to root or administrative levels, enabling unauthorized access to sensitive data, modification or deletion of critical files, and disruption of web services. This could lead to data breaches, service outages, and compliance violations under regulations such as GDPR. Given the network-exploitable nature and high impact on confidentiality, integrity, and availability, organizations face risks including data theft, defacement, ransomware deployment, or lateral movement within their networks. The vulnerability is particularly concerning for cloud-hosted environments and containerized deployments using the affected LiteSpeed Web Server Container, where privilege escalation can compromise entire container hosts or orchestrated clusters.
Mitigation Recommendations
European organizations should immediately verify their OpenLiteSpeed Web Server versions and upgrade to version 1.7.16.1 or later where the vulnerability is patched. In the absence of an official patch, organizations should implement strict path environment controls to ensure that the server only executes binaries from trusted directories. This includes sanitizing PATH variables, removing write permissions for unprivileged users on directories included in the search path, and employing application whitelisting where possible. Additionally, running the web server with the least privileges necessary and isolating it within containers or virtual machines can limit the blast radius of a potential exploit. Regular auditing of system binaries and monitoring for anomalous execution patterns or privilege escalations should be enforced. Network-level protections such as firewall rules restricting access to the management interfaces and multi-factor authentication for administrative access can further reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- palo_alto
- Date Reserved
- 2021-12-28T23:57:05.675Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9817c4522896dcbd744a
Added to database: 5/21/2025, 9:08:39 AM
Last enriched: 7/4/2025, 11:57:20 PM
Last updated: 7/26/2025, 6:11:09 AM
Views: 10
Related Threats
CVE-2025-8690: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in addix Simple Responsive Slider
MediumCVE-2025-8688: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ebernstein Inline Stock Quotes
MediumCVE-2025-8685: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in emilien Wp chart generator
MediumCVE-2025-8621: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in odn Mosaic Generator
MediumCVE-2025-8568: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in prabode GMap Generator
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.