Skip to main content

CVE-2022-41474: n/a in n/a

Medium
VulnerabilityCVE-2022-41474cvecve-2022-41474
Published: Thu Oct 13 2022 (10/13/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

RPCMS v3.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily change the password of any account.

AI-Powered Analysis

AILast updated: 07/06/2025, 11:13:26 UTC

Technical Analysis

CVE-2022-41474 is a vulnerability identified in RPCMS version 3.0.2, characterized as a Cross-Site Request Forgery (CSRF) flaw. CSRF vulnerabilities enable attackers to trick authenticated users into submitting unwanted actions to a web application in which they are currently authenticated. In this specific case, the vulnerability allows an attacker to arbitrarily change the password of any account without requiring prior authentication or elevated privileges. The CVSS 3.1 base score of 6.5 (medium severity) reflects that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts the integrity of the system (I:H) without affecting confidentiality or availability. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component. The absence of a vendor or product name beyond RPCMS 3.0.2 limits detailed attribution, but the vulnerability is serious because it allows unauthorized password changes, potentially leading to account takeover. No known exploits are currently reported in the wild, and no patches have been linked, indicating that mitigation may rely on configuration or additional controls until an official fix is released. The vulnerability is classified under CWE-352, which is the standard identifier for CSRF issues. Given that password changes are sensitive operations, this vulnerability could be exploited to disrupt user access or facilitate further attacks by gaining unauthorized access to accounts.

Potential Impact

For European organizations, the impact of CVE-2022-41474 could be significant if RPCMS 3.0.2 is in use, particularly in environments where user account management is critical. Unauthorized password changes can lead to account takeovers, loss of control over sensitive systems, and potential lateral movement within networks. This could compromise the integrity of user accounts and potentially lead to data manipulation or unauthorized access to protected resources. Since the vulnerability does not affect confidentiality directly, the primary risk is the integrity and trustworthiness of user credentials and access controls. Organizations in sectors such as finance, healthcare, government, and critical infrastructure in Europe could face operational disruptions or reputational damage if attackers exploit this flaw. The requirement for user interaction (UI:R) means phishing or social engineering could be used to trigger the exploit, increasing the risk in environments with less user security awareness. The lack of known exploits in the wild suggests a window of opportunity for organizations to remediate before active exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2022-41474 effectively, European organizations should first verify if RPCMS version 3.0.2 is deployed within their infrastructure. If so, immediate steps include: 1) Implementing anti-CSRF tokens in all forms that perform sensitive actions such as password changes to ensure requests are legitimate. 2) Enforcing strict referer header validation to block unauthorized cross-site requests. 3) Enhancing user authentication mechanisms by requiring re-authentication or multi-factor authentication (MFA) before allowing password changes. 4) Conducting user awareness training to reduce the risk of social engineering attacks that could trigger CSRF exploits. 5) Monitoring logs for unusual password change activities or patterns indicative of CSRF exploitation attempts. 6) If possible, isolating or restricting access to the RPCMS management interface to trusted networks or VPNs. 7) Engaging with the software vendor or community to obtain patches or updates addressing this vulnerability. Until an official patch is available, applying web application firewalls (WAFs) with rules targeting CSRF attack patterns may provide additional protection.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-09-26T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec683

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 11:13:26 AM

Last updated: 8/15/2025, 3:55:26 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats