Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-37204: n/a in n/a

0
Critical
VulnerabilityCVE-2022-37204cvecve-2022-37204
Published: Tue Sep 20 2022 (09/20/2022, 16:58:31 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Final CMS 5.1.0 is vulnerable to SQL Injection.

AI-Powered Analysis

AILast updated: 07/06/2025, 02:41:55 UTC

Technical Analysis

CVE-2022-37204 is a critical SQL Injection vulnerability affecting Final CMS version 5.1.0. SQL Injection (CWE-89) is a common and severe security flaw that allows an attacker to manipulate backend SQL queries by injecting malicious input into unsanitized user inputs. This vulnerability enables remote attackers to execute arbitrary SQL commands without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact on confidentiality, integrity, and availability is high, as attackers can potentially extract sensitive data, modify or delete database contents, or disrupt service availability. The vulnerability is remotely exploitable over the network with low attack complexity, making it a critical risk for any deployment of Final CMS 5.1.0. Although no known exploits are currently reported in the wild, the high CVSS score of 9.8 reflects the severity and ease of exploitation. The lack of vendor or product details beyond Final CMS 5.1.0 limits the scope of affected systems, but any organization using this CMS version is at significant risk. The absence of patch links suggests that no official fix was available at the time of publication, emphasizing the need for immediate mitigation steps.

Potential Impact

For European organizations using Final CMS 5.1.0, this vulnerability poses a substantial threat to data confidentiality, integrity, and system availability. Exploitation could lead to unauthorized access to sensitive customer or business data, data corruption, or complete service disruption. This is particularly critical for organizations handling personal data under GDPR, as breaches could result in regulatory penalties and reputational damage. Public sector entities, e-commerce platforms, and media companies relying on Final CMS for content management are at heightened risk. The remote and unauthenticated nature of the exploit increases the likelihood of automated attacks or mass scanning by threat actors targeting vulnerable installations across Europe. The potential for data exfiltration or defacement could also impact trust and operational continuity.

Mitigation Recommendations

1. Immediate upgrade: Organizations should verify their Final CMS version and upgrade to a patched version if available. If no official patch exists, consider applying community or vendor-provided workarounds. 2. Input validation and sanitization: Implement strict input validation and parameterized queries or prepared statements in the CMS codebase to prevent injection. 3. Web Application Firewall (WAF): Deploy and configure a WAF with rules to detect and block SQL injection attempts targeting Final CMS. 4. Network segmentation: Isolate CMS servers from critical backend systems and databases to limit potential damage. 5. Monitoring and logging: Enable detailed logging of database queries and web requests to detect suspicious activity indicative of exploitation attempts. 6. Access controls: Restrict database user privileges to the minimum necessary to reduce impact if exploited. 7. Incident response readiness: Prepare to respond quickly to any detected exploitation, including isolating affected systems and conducting forensic analysis.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-08-01T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68360472182aa0cae21ef798

Added to database: 5/27/2025, 6:29:06 PM

Last enriched: 7/6/2025, 2:41:55 AM

Last updated: 2/7/2026, 4:39:44 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats