Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-43320: n/a in n/a

0
Medium
VulnerabilityCVE-2022-43320cvecve-2022-43320
Published: Wed Nov 09 2022 (11/09/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

FeehiCMS v2.1.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /web/admin/index.php?r=log%2Fview-layer.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 06/25/2025, 20:12:52 UTC

Technical Analysis

CVE-2022-43320 is a reflected Cross-Site Scripting (XSS) vulnerability identified in FeehiCMS version 2.1.1. The vulnerability arises from improper sanitization of the 'id' parameter in the URL path /web/admin/index.php?r=log%2Fview-layer. An attacker can craft a malicious URL containing a specially crafted payload in the 'id' parameter, which when accessed by an authenticated user (likely an administrator or user with access to the admin panel), causes the injected script to be executed in the victim's browser context. This reflected XSS vulnerability allows the attacker to execute arbitrary JavaScript code, potentially leading to session hijacking, credential theft, or performing actions on behalf of the victim within the CMS interface. The CVSS v3.1 base score is 6.1 (medium severity), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), but does require user interaction (UI:R), and impacts confidentiality and integrity with a scope change (S:C). There is no known public exploit in the wild, and no official patch links have been provided. The vulnerability is classified under CWE-79, which corresponds to improper neutralization of input during web page generation. Given the nature of FeehiCMS as a content management system, exploitation could compromise website content integrity and user data confidentiality.

Potential Impact

For European organizations using FeehiCMS 2.1.1, this vulnerability poses a risk primarily to the confidentiality and integrity of administrative sessions and data. Successful exploitation could allow attackers to hijack admin sessions, manipulate website content, inject malicious scripts, or steal sensitive information. This could lead to reputational damage, data breaches, and potential regulatory non-compliance under GDPR if personal data is exposed. Since the vulnerability requires user interaction and targets the admin interface, the impact is higher in organizations with less stringent access controls or where administrators might be tricked into clicking malicious links. Additionally, compromised CMS platforms can serve as a foothold for further attacks within the network, increasing the risk of lateral movement and data exfiltration. The reflected XSS does not directly affect availability but can indirectly cause service disruption if malicious scripts deface websites or disrupt administrative operations.

Mitigation Recommendations

1. Immediate mitigation involves implementing strict input validation and output encoding on the 'id' parameter to neutralize malicious scripts. 2. Organizations should monitor and restrict access to the /web/admin/index.php?r=log%2Fview-layer endpoint, ideally limiting it to trusted IP addresses or VPN access. 3. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. 4. Educate administrators and users with access to the CMS about phishing risks and the dangers of clicking untrusted links. 5. If possible, upgrade FeehiCMS to a patched version once available or apply custom patches to sanitize inputs. 6. Implement Web Application Firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting the vulnerable parameter. 7. Regularly audit logs for suspicious access patterns or attempts to exploit the vulnerability. 8. Use multi-factor authentication (MFA) for admin accounts to reduce the risk of session hijacking consequences.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbecb55

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 6/25/2025, 8:12:52 PM

Last updated: 3/25/2026, 11:09:49 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses