CVE-2022-40359: n/a in n/a
Cross site scripting (XSS) vulnerability in kfm through 1.4.7 via crafted GET request to /kfm/index.php.
AI Analysis
Technical Summary
CVE-2022-40359 is a Cross-Site Scripting (XSS) vulnerability identified in the kfm file manager software, specifically affecting versions up to 1.4.7. The vulnerability arises from improper sanitization of user-supplied input in a crafted GET request to the /kfm/index.php endpoint. This flaw allows an attacker to inject malicious scripts into the web interface, which can then be executed in the context of the victim's browser session. The vulnerability is classified under CWE-79, indicating that it is a classic reflected XSS issue. According to the CVSS 3.1 scoring, it has a base score of 6.1 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requires user interaction (the victim must click a crafted link). The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable component, and the impact affects confidentiality and integrity but not availability. There are no known exploits in the wild reported, and no official patches or vendor information is provided. The vulnerability could be leveraged by attackers to steal session cookies, perform actions on behalf of authenticated users, or deliver further malicious payloads, potentially leading to account compromise or data leakage within affected deployments of kfm.
Potential Impact
For European organizations using kfm file manager, this vulnerability poses a risk primarily to web application security and user data confidentiality. Exploitation could lead to session hijacking, unauthorized actions, or exposure of sensitive information through injected scripts. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, could face compliance issues if such attacks lead to data breaches. The medium severity score reflects that while the vulnerability requires user interaction, the ease of exploitation and network accessibility make it a credible threat. Given the lack of patches, organizations continuing to use vulnerable versions may be exposed to targeted phishing or social engineering campaigns exploiting this XSS flaw. The impact on integrity and confidentiality could undermine trust in affected services and potentially disrupt business operations if attackers escalate privileges or pivot to other internal systems.
Mitigation Recommendations
Organizations should immediately assess their use of kfm file manager and identify any instances running version 1.4.7 or earlier. In absence of official patches, mitigation should focus on implementing web application firewalls (WAFs) with rules to detect and block malicious payloads targeting /kfm/index.php GET requests. Input validation and output encoding should be enforced at the application level if source code access is available, sanitizing all user inputs to prevent script injection. User awareness training to recognize suspicious links can reduce the risk of successful exploitation requiring user interaction. Additionally, monitoring web server logs for anomalous requests and unusual user behavior can help detect attempted exploitation. Organizations should also consider isolating or restricting access to the kfm interface to trusted networks or VPN users to reduce exposure. Finally, staying alert for vendor updates or community patches is critical to apply official fixes once available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2022-40359: n/a in n/a
Description
Cross site scripting (XSS) vulnerability in kfm through 1.4.7 via crafted GET request to /kfm/index.php.
AI-Powered Analysis
Technical Analysis
CVE-2022-40359 is a Cross-Site Scripting (XSS) vulnerability identified in the kfm file manager software, specifically affecting versions up to 1.4.7. The vulnerability arises from improper sanitization of user-supplied input in a crafted GET request to the /kfm/index.php endpoint. This flaw allows an attacker to inject malicious scripts into the web interface, which can then be executed in the context of the victim's browser session. The vulnerability is classified under CWE-79, indicating that it is a classic reflected XSS issue. According to the CVSS 3.1 scoring, it has a base score of 6.1 (medium severity), with an attack vector of network (remote exploitation), low attack complexity, no privileges required, but requires user interaction (the victim must click a crafted link). The scope is changed, meaning the vulnerability affects components beyond the initially vulnerable component, and the impact affects confidentiality and integrity but not availability. There are no known exploits in the wild reported, and no official patches or vendor information is provided. The vulnerability could be leveraged by attackers to steal session cookies, perform actions on behalf of authenticated users, or deliver further malicious payloads, potentially leading to account compromise or data leakage within affected deployments of kfm.
Potential Impact
For European organizations using kfm file manager, this vulnerability poses a risk primarily to web application security and user data confidentiality. Exploitation could lead to session hijacking, unauthorized actions, or exposure of sensitive information through injected scripts. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, could face compliance issues if such attacks lead to data breaches. The medium severity score reflects that while the vulnerability requires user interaction, the ease of exploitation and network accessibility make it a credible threat. Given the lack of patches, organizations continuing to use vulnerable versions may be exposed to targeted phishing or social engineering campaigns exploiting this XSS flaw. The impact on integrity and confidentiality could undermine trust in affected services and potentially disrupt business operations if attackers escalate privileges or pivot to other internal systems.
Mitigation Recommendations
Organizations should immediately assess their use of kfm file manager and identify any instances running version 1.4.7 or earlier. In absence of official patches, mitigation should focus on implementing web application firewalls (WAFs) with rules to detect and block malicious payloads targeting /kfm/index.php GET requests. Input validation and output encoding should be enforced at the application level if source code access is available, sanitizing all user inputs to prevent script injection. User awareness training to recognize suspicious links can reduce the risk of successful exploitation requiring user interaction. Additionally, monitoring web server logs for anomalous requests and unusual user behavior can help detect attempted exploitation. Organizations should also consider isolating or restricting access to the kfm interface to trusted networks or VPN users to reduce exposure. Finally, staying alert for vendor updates or community patches is critical to apply official fixes once available.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-09-11T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682f3a190acd01a249261238
Added to database: 5/22/2025, 2:52:09 PM
Last enriched: 7/8/2025, 10:13:22 AM
Last updated: 2/4/2026, 12:02:00 AM
Views: 32
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumCVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
MediumCVE-2026-24513: CWE-754 Improper Check for Unusual or Exceptional Conditions in Kubernetes ingress-nginx
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.