Skip to main content

CVE-2022-43074: n/a in n/a

Critical
VulnerabilityCVE-2022-43074cvecve-2022-43074
Published: Thu Nov 10 2022 (11/10/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

AyaCMS v3.1.2 was discovered to contain an arbitrary file upload vulnerability via the component /admin/fst_upload.inc.php. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file.

AI-Powered Analysis

AILast updated: 07/02/2025, 02:27:21 UTC

Technical Analysis

CVE-2022-43074 is a critical arbitrary file upload vulnerability identified in AyaCMS version 3.1.2, specifically within the component /admin/fst_upload.inc.php. This vulnerability allows an unauthenticated attacker to upload malicious files, such as crafted PHP scripts, to the server without any user interaction or privileges. Exploiting this flaw enables the attacker to execute arbitrary code remotely, potentially leading to full system compromise. The vulnerability is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it highly exploitable. The impact affects confidentiality, integrity, and availability (C:H/I:H/A:H), as attackers can execute code, manipulate data, and disrupt services. Although no official patch links are provided, the vulnerability disclosure date is November 10, 2022, and no known exploits in the wild have been reported yet. Given the nature of the vulnerability, it is likely that automated exploit tools could be developed rapidly, increasing the risk to affected systems if unpatched. AyaCMS is a content management system, and such platforms are often used by organizations to manage websites and web applications, making this vulnerability particularly dangerous for web-facing infrastructure.

Potential Impact

For European organizations, the impact of CVE-2022-43074 could be severe. Organizations using AyaCMS 3.1.2 or earlier versions are at risk of remote code execution attacks, which can lead to unauthorized access, data breaches, defacement of websites, or use of compromised servers as pivot points for further attacks within corporate networks. The confidentiality of sensitive customer or business data could be compromised, and the integrity of web content and backend systems could be undermined. Availability may also be affected if attackers deploy ransomware or disrupt services. Given the critical nature of the vulnerability and the lack of required authentication, attackers can exploit this flaw at scale, potentially targeting European government websites, SMEs, and enterprises that rely on AyaCMS for their web presence. This could result in reputational damage, regulatory penalties under GDPR for data breaches, and operational disruptions. The absence of known exploits in the wild currently provides a window for mitigation, but the risk of exploitation will increase over time if patches or mitigations are not applied promptly.

Mitigation Recommendations

European organizations should immediately assess their exposure to AyaCMS 3.1.2 or earlier versions. Specific mitigation steps include: 1) Conducting an inventory of web applications to identify any instances of AyaCMS and verifying their versions. 2) Applying any available patches or updates from AyaCMS vendors or community sources; if no official patch exists, consider disabling or restricting access to the vulnerable /admin/fst_upload.inc.php component. 3) Implementing strict web application firewall (WAF) rules to detect and block attempts to upload PHP or other executable files via the vulnerable endpoint. 4) Restricting access to the /admin directory by IP whitelisting or VPN-only access to reduce exposure. 5) Monitoring web server logs for suspicious file upload attempts or unusual activity related to the upload component. 6) Employing file integrity monitoring to detect unauthorized changes or uploads. 7) Segregating web servers from critical internal networks to limit lateral movement if compromise occurs. 8) Educating IT and security teams about this vulnerability to ensure rapid response. These targeted measures go beyond generic advice by focusing on the specific vulnerable component and practical access controls.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbecdf7

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 7/2/2025, 2:27:21 AM

Last updated: 7/29/2025, 6:17:19 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats