Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-32177: CWE-434 Unrestricted Upload of File with Dangerous Type in gin-vue-admin gin-vue-admin

0
Critical
VulnerabilityCVE-2022-32177cvecve-2022-32177cwe-434
Published: Fri Oct 14 2022 (10/14/2022, 07:00:14 UTC)
Source: CVE
Vendor/Project: gin-vue-admin
Product: gin-vue-admin

Description

In "Gin-Vue-Admin", versions v2.5.1 through v2.5.3beta are vulnerable to Unrestricted File Upload that leads to execution of javascript code, through the 'Normal Upload' functionality to the Media Library. When an admin user views the uploaded file, a low privilege attacker will get access to the admin’s cookie leading to account takeover.

AI-Powered Analysis

AILast updated: 07/06/2025, 14:56:21 UTC

Technical Analysis

CVE-2022-32177 is a critical vulnerability affecting the gin-vue-admin project, specifically versions v2.5.1 through v2.5.3beta. The vulnerability is classified under CWE-434, which pertains to Unrestricted Upload of File with Dangerous Type. The issue arises in the 'Normal Upload' functionality of the Media Library component, where an attacker with low privileges can upload files without proper validation or restriction on file types. This flaw enables the attacker to upload malicious JavaScript code disguised as media files. When an administrator subsequently views the uploaded file, the malicious script executes in the admin's browser context, allowing the attacker to steal the admin's session cookie. This cookie theft can lead to a full account takeover of the administrator account, escalating the attacker's privileges and control over the affected system. The vulnerability has a CVSS v3.1 base score of 9.0, indicating critical severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits in the wild have been reported yet, but the potential impact is severe due to the ability to compromise administrative accounts and execute arbitrary code via the web interface. The vulnerability is particularly dangerous because it leverages a common web application feature (file upload) and exploits insufficient validation controls, a frequent source of web application security issues. No official patch links were provided in the data, so users must monitor the gin-vue-admin project for updates or apply custom mitigations.

Potential Impact

For European organizations using gin-vue-admin, this vulnerability poses a significant risk to the confidentiality, integrity, and availability of their administrative interfaces and underlying systems. An attacker exploiting this vulnerability can gain administrative access, potentially leading to unauthorized data access, modification, or deletion. This could result in data breaches involving personal data protected under GDPR, leading to regulatory penalties and reputational damage. Additionally, compromised admin accounts could be used to pivot to other internal systems, increasing the scope of the breach. The exploitation requires low privileges but does require the attacker to upload a malicious file and an admin to interact with it, which is plausible in many operational environments. The critical severity and the ability to execute arbitrary JavaScript code make this a high-risk vulnerability for organizations relying on gin-vue-admin for administrative tasks, especially those handling sensitive or regulated data. The absence of known exploits in the wild does not reduce the urgency, as the vulnerability is straightforward to exploit once discovered. European organizations should prioritize assessing their exposure and applying mitigations promptly.

Mitigation Recommendations

1. Immediate mitigation should include restricting file upload types to a safe whitelist, explicitly allowing only necessary and safe file formats (e.g., images with strict MIME type and content validation). 2. Implement server-side validation to verify file contents match their declared types, preventing disguised malicious scripts. 3. Employ Content Security Policy (CSP) headers to limit the execution of inline scripts and reduce the impact of any injected JavaScript. 4. Sanitize and encode all user-uploaded content before rendering it in the admin interface to prevent script execution. 5. Limit the privileges of users who can upload files, and monitor upload activities for suspicious behavior. 6. Educate administrators to avoid opening or interacting with untrusted uploaded files until the vulnerability is patched. 7. Regularly update gin-vue-admin to the latest patched versions once available. 8. Consider isolating the media library or file upload functionality in a sandboxed environment to contain potential exploits. 9. Conduct security audits and penetration testing focused on file upload features to detect similar vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Mend
Date Reserved
2022-05-31T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec9a1

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 2:56:21 PM

Last updated: 2/7/2026, 6:36:32 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats