CVE-2022-43320: n/a in n/a
FeehiCMS v2.1.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /web/admin/index.php?r=log%2Fview-layer.
AI Analysis
Technical Summary
CVE-2022-43320 is a reflected Cross-Site Scripting (XSS) vulnerability identified in FeehiCMS version 2.1.1. The vulnerability arises from improper sanitization of the 'id' parameter in the URL path /web/admin/index.php?r=log%2Fview-layer. An attacker can craft a malicious URL containing a specially crafted payload in the 'id' parameter, which when accessed by an authenticated user (likely an administrator or user with access to the admin panel), causes the injected script to be executed in the victim's browser context. This reflected XSS vulnerability allows the attacker to execute arbitrary JavaScript code, potentially leading to session hijacking, credential theft, or performing actions on behalf of the victim within the CMS interface. The CVSS v3.1 base score is 6.1 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts confidentiality and integrity with a scope change (S:C). There is no known public exploit in the wild, and no official patch links have been provided. The vulnerability is classified under CWE-79, which corresponds to improper neutralization of input during web page generation. Given the nature of FeehiCMS as a content management system, exploitation could compromise website content integrity and user data confidentiality.
Potential Impact
For European organizations using FeehiCMS 2.1.1, this vulnerability poses a risk primarily to the confidentiality and integrity of administrative sessions and data. Successful exploitation could allow attackers to hijack admin sessions, manipulate website content, inject malicious scripts, or steal sensitive information. This could lead to reputational damage, data breaches, and potential regulatory non-compliance under GDPR if personal data is exposed. Since the vulnerability requires user interaction and targets the admin interface, the impact is higher in organizations with less stringent access controls or where administrators might be tricked into clicking malicious links. Additionally, compromised CMS platforms can serve as a foothold for further attacks within the network, increasing the risk of lateral movement and data exfiltration. The reflected XSS does not directly affect availability but can indirectly cause service disruption if malicious scripts deface websites or disrupt administrative operations.
Mitigation Recommendations
1. Immediate mitigation involves implementing strict input validation and output encoding on the 'id' parameter to neutralize malicious scripts. 2. Organizations should monitor and restrict access to the /web/admin/index.php?r=log%2Fview-layer endpoint, ideally limiting it to trusted IP addresses or VPN access. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 4. Educate administrators and users with access to the CMS about phishing risks and the dangers of clicking untrusted links. 5. If possible, upgrade FeehiCMS to a patched version once available or apply custom patches to sanitize inputs. 6. Implement Web Application Firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting the vulnerable parameter. 7. Regularly audit logs for suspicious access patterns or attempts to exploit the vulnerability. 8. Use multi-factor authentication (MFA) for admin accounts to reduce the risk of session hijacking consequences.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2022-43320: n/a in n/a
Description
FeehiCMS v2.1.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /web/admin/index.php?r=log%2Fview-layer.
AI-Powered Analysis
Technical Analysis
CVE-2022-43320 is a reflected Cross-Site Scripting (XSS) vulnerability identified in FeehiCMS version 2.1.1. The vulnerability arises from improper sanitization of the 'id' parameter in the URL path /web/admin/index.php?r=log%2Fview-layer. An attacker can craft a malicious URL containing a specially crafted payload in the 'id' parameter, which when accessed by an authenticated user (likely an administrator or user with access to the admin panel), causes the injected script to be executed in the victim's browser context. This reflected XSS vulnerability allows the attacker to execute arbitrary JavaScript code, potentially leading to session hijacking, credential theft, or performing actions on behalf of the victim within the CMS interface. The CVSS v3.1 base score is 6.1 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts confidentiality and integrity with a scope change (S:C). There is no known public exploit in the wild, and no official patch links have been provided. The vulnerability is classified under CWE-79, which corresponds to improper neutralization of input during web page generation. Given the nature of FeehiCMS as a content management system, exploitation could compromise website content integrity and user data confidentiality.
Potential Impact
For European organizations using FeehiCMS 2.1.1, this vulnerability poses a risk primarily to the confidentiality and integrity of administrative sessions and data. Successful exploitation could allow attackers to hijack admin sessions, manipulate website content, inject malicious scripts, or steal sensitive information. This could lead to reputational damage, data breaches, and potential regulatory non-compliance under GDPR if personal data is exposed. Since the vulnerability requires user interaction and targets the admin interface, the impact is higher in organizations with less stringent access controls or where administrators might be tricked into clicking malicious links. Additionally, compromised CMS platforms can serve as a foothold for further attacks within the network, increasing the risk of lateral movement and data exfiltration. The reflected XSS does not directly affect availability but can indirectly cause service disruption if malicious scripts deface websites or disrupt administrative operations.
Mitigation Recommendations
1. Immediate mitigation involves implementing strict input validation and output encoding on the 'id' parameter to neutralize malicious scripts. 2. Organizations should monitor and restrict access to the /web/admin/index.php?r=log%2Fview-layer endpoint, ideally limiting it to trusted IP addresses or VPN access. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 4. Educate administrators and users with access to the CMS about phishing risks and the dangers of clicking untrusted links. 5. If possible, upgrade FeehiCMS to a patched version once available or apply custom patches to sanitize inputs. 6. Implement Web Application Firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting the vulnerable parameter. 7. Regularly audit logs for suspicious access patterns or attempts to exploit the vulnerability. 8. Use multi-factor authentication (MFA) for admin accounts to reduce the risk of session hijacking consequences.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-17T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9839c4522896dcbecb55
Added to database: 5/21/2025, 9:09:13 AM
Last enriched: 6/25/2025, 8:12:52 PM
Last updated: 8/14/2025, 12:56:42 AM
Views: 11
Related Threats
CVE-2025-9050: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9047: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-9046: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9028: SQL Injection in code-projects Online Medicine Guide
MediumCVE-2025-26709: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ZTE F50
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.