CVE-2022-44087: n/a in n/a
ESPCMS P8.21120101 was discovered to contain a remote code execution (RCE) vulnerability in the component UPFILE_PIC_ZOOM_HIGHT.
AI Analysis
Technical Summary
CVE-2022-44087 is a critical remote code execution (RCE) vulnerability identified in the ESPCMS system, specifically within the component named UPFILE_PIC_ZOOM_HIGHT. ESPCMS appears to be a content management system, though specific vendor and product details are not provided. The vulnerability is classified under CWE-94, which relates to improper control of code generation, indicating that the system likely allows untrusted input to be executed as code. The CVSS v3.1 base score is 9.8, reflecting a critical severity level with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can remotely exploit this vulnerability without authentication or user interaction to execute arbitrary code, potentially taking full control of the affected system. No patches or vendor advisories are currently linked, and no known exploits in the wild have been reported as of the published date (November 10, 2022). The lack of detailed product/version information limits precise identification of affected deployments, but the critical nature of the vulnerability and the ease of exploitation make it a significant threat to any organization using ESPCMS with the vulnerable component.
Potential Impact
For European organizations, the impact of CVE-2022-44087 could be severe if ESPCMS is in use, particularly in sectors relying on web content management systems such as government, education, media, and e-commerce. Successful exploitation could lead to full system compromise, data breaches involving sensitive personal or corporate data, defacement of websites, disruption of services, and potential lateral movement within networks. Given the vulnerability allows unauthenticated remote code execution, attackers could deploy ransomware, steal intellectual property, or use compromised systems as footholds for further attacks. The absence of known exploits might reduce immediate risk, but the critical CVSS score and public disclosure increase the likelihood of future exploitation attempts. European organizations must consider compliance implications under GDPR if personal data is exposed or compromised due to this vulnerability.
Mitigation Recommendations
Since no official patches or vendor advisories are currently linked, European organizations should take immediate compensating controls. These include: 1) Conducting an inventory to identify any ESPCMS deployments and specifically the presence of the UPFILE_PIC_ZOOM_HIGHT component. 2) Restricting network access to the affected systems by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 3) Employing web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable component. 4) Monitoring logs and network traffic for anomalous activity indicative of exploitation attempts. 5) If possible, disabling or removing the vulnerable component until a patch is available. 6) Applying principle of least privilege to limit the impact of any potential compromise. 7) Preparing incident response plans specific to web server compromise scenarios. Organizations should also maintain close monitoring of vendor communications for any forthcoming patches or updates.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2022-44087: n/a in n/a
Description
ESPCMS P8.21120101 was discovered to contain a remote code execution (RCE) vulnerability in the component UPFILE_PIC_ZOOM_HIGHT.
AI-Powered Analysis
Technical Analysis
CVE-2022-44087 is a critical remote code execution (RCE) vulnerability identified in the ESPCMS system, specifically within the component named UPFILE_PIC_ZOOM_HIGHT. ESPCMS appears to be a content management system, though specific vendor and product details are not provided. The vulnerability is classified under CWE-94, which relates to improper control of code generation, indicating that the system likely allows untrusted input to be executed as code. The CVSS v3.1 base score is 9.8, reflecting a critical severity level with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts on confidentiality, integrity, and availability (C:H/I:H/A:H). This means an attacker can remotely exploit this vulnerability without authentication or user interaction to execute arbitrary code, potentially taking full control of the affected system. No patches or vendor advisories are currently linked, and no known exploits in the wild have been reported as of the published date (November 10, 2022). The lack of detailed product/version information limits precise identification of affected deployments, but the critical nature of the vulnerability and the ease of exploitation make it a significant threat to any organization using ESPCMS with the vulnerable component.
Potential Impact
For European organizations, the impact of CVE-2022-44087 could be severe if ESPCMS is in use, particularly in sectors relying on web content management systems such as government, education, media, and e-commerce. Successful exploitation could lead to full system compromise, data breaches involving sensitive personal or corporate data, defacement of websites, disruption of services, and potential lateral movement within networks. Given the vulnerability allows unauthenticated remote code execution, attackers could deploy ransomware, steal intellectual property, or use compromised systems as footholds for further attacks. The absence of known exploits might reduce immediate risk, but the critical CVSS score and public disclosure increase the likelihood of future exploitation attempts. European organizations must consider compliance implications under GDPR if personal data is exposed or compromised due to this vulnerability.
Mitigation Recommendations
Since no official patches or vendor advisories are currently linked, European organizations should take immediate compensating controls. These include: 1) Conducting an inventory to identify any ESPCMS deployments and specifically the presence of the UPFILE_PIC_ZOOM_HIGHT component. 2) Restricting network access to the affected systems by implementing strict firewall rules and network segmentation to limit exposure to untrusted networks. 3) Employing web application firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the vulnerable component. 4) Monitoring logs and network traffic for anomalous activity indicative of exploitation attempts. 5) If possible, disabling or removing the vulnerable component until a patch is available. 6) Applying principle of least privilege to limit the impact of any potential compromise. 7) Preparing incident response plans specific to web server compromise scenarios. Organizations should also maintain close monitoring of vendor communications for any forthcoming patches or updates.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2022-10-30T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9839c4522896dcbece52
Added to database: 5/21/2025, 9:09:13 AM
Last enriched: 7/2/2025, 2:28:16 AM
Last updated: 2/7/2026, 12:42:44 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.