Skip to main content

CVE-2022-32176: CWE-434 Unrestricted Upload of File with Dangerous Type in gin-vue-admin gin-vue-admin

Critical
VulnerabilityCVE-2022-32176cvecve-2022-32176cwe-434
Published: Mon Oct 17 2022 (10/17/2022, 18:25:09 UTC)
Source: CVE
Vendor/Project: gin-vue-admin
Product: gin-vue-admin

Description

In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3b are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the "Compress Upload" functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin's cookie leading to account takeover.

AI-Powered Analysis

AILast updated: 07/04/2025, 23:09:37 UTC

Technical Analysis

CVE-2022-32176 is a critical vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the gin-vue-admin project, specifically versions v2.5.1 through v2.5.3b. The vulnerability arises from the "Compress Upload" functionality in the Media Library component, which does not properly restrict the types of files that can be uploaded. This flaw allows a low-privilege attacker to upload malicious files containing executable JavaScript code. When an administrator subsequently views the uploaded file, the malicious script executes in the context of the admin's browser session. This leads to theft of the administrator's session cookie, enabling the attacker to hijack the admin account and gain elevated privileges within the application. The vulnerability has a CVSS 3.1 base score of 9.0, indicating critical severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), and user interaction (UI:R). The scope is changed (S:C), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are currently known in the wild, the vulnerability poses a significant risk due to the potential for account takeover and subsequent unauthorized administrative actions. The root cause is insufficient validation and sanitization of uploaded files, allowing dangerous file types to be stored and executed in the admin interface. This vulnerability highlights the importance of strict file upload controls and secure handling of user-generated content in web applications.

Potential Impact

For European organizations using gin-vue-admin, this vulnerability could lead to severe consequences including unauthorized administrative access, data breaches, and potential disruption of services. Since gin-vue-admin is an administrative interface framework, compromise of admin accounts can result in full control over the affected system, enabling attackers to manipulate data, exfiltrate sensitive information, or deploy further malware. The impact is particularly critical for organizations handling sensitive or regulated data under GDPR, as unauthorized access could lead to compliance violations and significant financial penalties. Additionally, the ability to execute JavaScript in the admin context can facilitate lateral movement within the network, increasing the risk of broader compromise. The requirement for only low privilege and user interaction means that attackers with minimal access can exploit this vulnerability, increasing the threat surface. European organizations relying on gin-vue-admin for internal or customer-facing administrative portals should consider this vulnerability a high priority for remediation to protect their operational integrity and data confidentiality.

Mitigation Recommendations

1. Immediate upgrade: Organizations should upgrade gin-vue-admin to a patched version beyond v2.5.3b once available. In the absence of an official patch, consider applying custom patches or disabling the "Compress Upload" functionality temporarily. 2. File upload restrictions: Implement strict server-side validation to restrict allowed file types to safe formats only, rejecting any executable or script files. 3. Content sanitization: Sanitize and validate all uploaded content to prevent execution of embedded scripts. 4. Access controls: Limit upload permissions strictly to trusted users and enforce the principle of least privilege. 5. Admin interface hardening: Use Content Security Policy (CSP) headers to restrict execution of inline scripts and reduce the risk of cross-site scripting. 6. Session security: Implement HttpOnly and Secure flags on cookies to mitigate cookie theft via script execution. 7. Monitoring and alerting: Deploy monitoring to detect unusual upload activity and anomalous admin session behavior. 8. User training: Educate administrators to be cautious when interacting with uploaded files and report suspicious content. 9. Network segmentation: Isolate administrative interfaces from general user access to reduce exposure. 10. Incident response readiness: Prepare to respond quickly to any signs of compromise related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Mend
Date Reserved
2022-05-31T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9817c4522896dcbd7226

Added to database: 5/21/2025, 9:08:39 AM

Last enriched: 7/4/2025, 11:09:37 PM

Last updated: 7/31/2025, 1:18:24 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats