Skip to main content

CVE-2022-40408: n/a in n/a

Medium
VulnerabilityCVE-2022-40408cvecve-2022-40408
Published: Thu Sep 29 2022 (09/29/2022, 13:33:54 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

FeehiCMS v2.1.1 was discovered to contain a cross-site scripting (XSS) vulnerability via a crafted payload injected into the Comment box under the Single Page module.

AI-Powered Analysis

AILast updated: 07/04/2025, 08:40:35 UTC

Technical Analysis

CVE-2022-40408 is a cross-site scripting (XSS) vulnerability identified in FeehiCMS version 2.1.1, specifically exploitable via a crafted payload injected into the Comment box within the Single Page module. FeehiCMS is a content management system, and this vulnerability allows an attacker to inject malicious scripts that execute in the context of a victim's browser when they view the affected page. The vulnerability is classified under CWE-79, which pertains to improper neutralization of input during web page generation, leading to XSS. The CVSS 3.1 base score is 5.4, indicating a medium severity level. The vector string (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reveals that the attack can be performed remotely over the network with low attack complexity, requires privileges (PR:L) and user interaction (UI:R), and impacts confidentiality and integrity with a scope change (S:C). There are no known exploits in the wild, and no patches or vendor advisories are currently linked. The vulnerability could allow attackers to steal session cookies, perform actions on behalf of authenticated users, or redirect users to malicious sites, compromising user data and trust in the affected web application.

Potential Impact

For European organizations using FeehiCMS 2.1.1, this vulnerability poses a risk primarily to the confidentiality and integrity of user data. Attackers exploiting this XSS flaw could hijack user sessions, leading to unauthorized access to sensitive information or manipulation of content. This can damage the organization's reputation, especially under GDPR regulations where data breaches must be reported and can result in significant fines. The requirement for user interaction and privileges limits the ease of exploitation but does not eliminate risk, especially in environments where users have elevated permissions or where social engineering can be employed. The scope change indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting other parts of the web application. Although no active exploits are reported, the presence of this vulnerability in public-facing CMS platforms used by European entities could be leveraged by attackers targeting sectors such as government, education, or media, where FeehiCMS might be deployed.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are running FeehiCMS version 2.1.1 or earlier. Immediate steps include implementing strict input validation and output encoding on the Comment box input fields to neutralize malicious scripts. Employing Content Security Policy (CSP) headers can help restrict the execution of unauthorized scripts. Organizations should monitor user privileges and restrict comment submission capabilities to trusted users where possible. Regularly auditing web application logs for suspicious comment submissions or script injections is advisable. Since no official patch is currently linked, organizations should engage with the FeehiCMS community or developers to obtain or develop a security update. Additionally, educating users about the risks of interacting with untrusted content can reduce the impact of user interaction requirements. Deploying web application firewalls (WAFs) with rules targeting XSS payloads can provide an additional protective layer.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-11T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeac8d

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 8:40:35 AM

Last updated: 7/25/2025, 2:10:15 PM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats