CVE-2022-40359: n/a in n/a
Cross site scripting (XSS) vulnerability in kfm through 1.4.7 via crafted GET request to /kfm/index.php.
AI Analysis
Technical Summary
CVE-2022-40359 is a Cross-Site Scripting (XSS) vulnerability identified in the kfm file manager software, specifically affecting versions up to 1.4.7. The vulnerability arises from improper sanitization of user-supplied input in a crafted GET request to the /kfm/index.php endpoint. This flaw allows an attacker to inject malicious scripts into the web interface, which can then be executed in the context of the victim's browser session. The vulnerability is classified under CWE-79, indicating that it is a classic reflected XSS issue. According to the CVSS 3.1 scoring, it has a base score of 6.1 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requires user interaction (the victim must click a crafted link). The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable component, and the impact affects confidentiality and integrity but not availability. There are no known exploits in the wild reported, and no official patches or vendor information is provided. The vulnerability could be leveraged by attackers to steal session cookies, perform actions on behalf of authenticated users, or deliver further malicious payloads, potentially leading to account compromise or data leakage within affected deployments of kfm.
Potential Impact
For European organizations using kfm file manager, this vulnerability poses a risk primarily to web application security and user data confidentiality. Exploitation could lead to session hijacking, unauthorized actions, or exposure of sensitive information through injected scripts. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, could face compliance issues if such attacks lead to data breaches. The medium severity score reflects that while the vulnerability requires user interaction, the ease of exploitation and network accessibility make it a credible threat. Given the lack of patches, organizations continuing to use vulnerable versions may be exposed to targeted phishing or social engineering campaigns exploiting this XSS flaw. The impact on integrity and confidentiality could undermine trust in affected services and potentially disrupt business operations if attackers escalate privileges or pivot to other internal systems.
Mitigation Recommendations
Organizations should immediately assess their use of kfm file manager and identify any instances running version 1.4.7 or earlier. In absence of official patches, mitigation should focus on implementing web application firewalls (WAFs) with rules to detect and block malicious payloads targeting /kfm/index.php GET requests. Input validation and output encoding should be enforced at the application level if source code access is available, sanitizing all user inputs to prevent script injection. User awareness training to recognize suspicious links can reduce the risk of successful exploitation requiring user interaction. Additionally, monitoring web server logs for anomalous requests and unusual user behavior can help detect attempted exploitation. Organizations should also consider isolating or restricting access to the kfm interface to trusted networks or VPN users to reduce exposure. Finally, staying alert for vendor updates or community patches is critical to apply official fixes once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2022-40359: n/a in n/a
Description
Cross site scripting (XSS) vulnerability in kfm through 1.4.7 via crafted GET request to /kfm/index.php.
AI-Powered Analysis
Technical Analysis
CVE-2022-40359 is a Cross-Site Scripting (XSS) vulnerability identified in the kfm file manager software, specifically affecting versions up to 1.4.7. The vulnerability arises from improper sanitization of user-supplied input in a crafted GET request to the /kfm/index.php endpoint. This flaw allows an attacker to inject malicious scripts into the web interface, which can then be executed in the context of the victim's browser session. The vulnerability is classified under CWE-79, indicating that it is a classic reflected XSS issue. According to the CVSS 3.1 scoring, it has a base score of 6.1 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requires user interaction (the victim must click a crafted link). The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable component, and the impact affects confidentiality and integrity but not availability. There are no known exploits in the wild reported, and no official patches or vendor information is provided. The vulnerability could be leveraged by attackers to steal session cookies, perform actions on behalf of authenticated users, or deliver further malicious payloads, potentially leading to account compromise or data leakage within affected deployments of kfm.
Potential Impact
For European organizations using kfm file manager, this vulnerability poses a risk primarily to web application security and user data confidentiality. Exploitation could lead to session hijacking, unauthorized actions, or exposure of sensitive information through injected scripts. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, could face compliance issues if such attacks lead to data breaches. The medium severity score reflects that while the vulnerability requires user interaction, the ease of exploitation and network accessibility make it a credible threat. Given the lack of patches, organizations continuing to use vulnerable versions may be exposed to targeted phishing or social engineering campaigns exploiting this XSS flaw. The impact on integrity and confidentiality could undermine trust in affected services and potentially disrupt business operations if attackers escalate privileges or pivot to other internal systems.
Mitigation Recommendations
Organizations should immediately assess their use of kfm file manager and identify any instances running version 1.4.7 or earlier. In absence of official patches, mitigation should focus on implementing web application firewalls (WAFs) with rules to detect and block malicious payloads targeting /kfm/index.php GET requests. Input validation and output encoding should be enforced at the application level if source code access is available, sanitizing all user inputs to prevent script injection. User awareness training to recognize suspicious links can reduce the risk of successful exploitation requiring user interaction. Additionally, monitoring web server logs for anomalous requests and unusual user behavior can help detect attempted exploitation. Organizations should also consider isolating or restricting access to the kfm interface to trusted networks or VPN users to reduce exposure. Finally, staying alert for vendor updates or community patches is critical to apply official fixes once available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-09-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f3a190acd01a249261238
Added to database: 5/22/2025, 2:52:09 PM
Last enriched: 7/8/2025, 10:13:22 AM
Last updated: 7/31/2025, 2:41:12 PM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.