CVE-2022-46157: CWE-94: Improper Control of Generation of Code ('Code Injection') in akeneo pim-community-dev
Akeneo PIM is an open source Product Information Management (PIM). Akeneo PIM Community Edition versions before v5.0.119 and v6.0.53 allows remote authenticated users to execute arbitrary PHP code on the server by uploading a crafted image. Akeneo PIM Community Edition after the versions aforementioned provides patched Apache HTTP server configuration file, for docker setup and in documentation sample, to fix this vulnerability. Community Edition users must change their Apache HTTP server configuration accordingly to be protected. The patch for Cloud Based Akeneo PIM Services customers has been applied since 30th October 2022. Users are advised to upgrade. Users unable to upgrade may Replace any reference to `<FilesMatch \.php$>` in their apache httpd configurations with: `<Location "/index.php">`.
AI Analysis
Technical Summary
CVE-2022-46157 is a code injection vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting Akeneo PIM Community Edition, an open-source Product Information Management system widely used for managing product data. The vulnerability exists in versions prior to 5.0.119 and between 6.0.0 and 6.0.53. It allows remote authenticated users to execute arbitrary PHP code on the server by uploading a specially crafted image file. This occurs because the application insufficiently validates or sanitizes uploaded image files, enabling malicious code embedded within these files to be executed by the server. The vulnerability is particularly dangerous as it leads to remote code execution (RCE), which can compromise the confidentiality, integrity, and availability of the affected system. The issue is mitigated by changes in the Apache HTTP server configuration, specifically replacing any <FilesMatch \.php$> directives with <Location "/index.php"> to prevent direct execution of uploaded PHP code. Cloud-based Akeneo PIM services have been patched since October 30, 2022, but on-premises Community Edition users must manually update their Apache configurations or upgrade to patched versions to remediate the vulnerability. Exploitation requires authentication, meaning an attacker must have valid user credentials to upload the malicious image, but no further user interaction is needed once authenticated. There are no known exploits in the wild at this time, but the potential impact of successful exploitation is significant due to the ability to execute arbitrary code remotely.
Potential Impact
For European organizations using Akeneo PIM Community Edition, this vulnerability poses a substantial risk. Successful exploitation can lead to full server compromise, allowing attackers to access sensitive product data, intellectual property, and potentially pivot to other internal systems. This can disrupt business operations, damage reputation, and lead to regulatory compliance issues under GDPR due to unauthorized data access or alteration. Since Akeneo PIM is used in retail, manufacturing, and e-commerce sectors, industries critical to European economies could be affected. The requirement for authentication limits the attack surface to insiders or compromised accounts, but insider threats or credential theft could facilitate exploitation. The vulnerability's ability to execute arbitrary PHP code means attackers could deploy backdoors, ransomware, or exfiltrate data, severely impacting availability and integrity of services. Organizations relying on outdated versions or improper Apache configurations remain vulnerable, increasing their risk exposure.
Mitigation Recommendations
European organizations should prioritize upgrading Akeneo PIM Community Edition to versions 5.0.119 or later and 6.0.53 or later where the vulnerability is patched. For those unable to upgrade immediately, it is critical to modify the Apache HTTP server configuration by replacing any <FilesMatch \.php$> directives with <Location "/index.php"> to block direct execution of uploaded PHP files. Additionally, organizations should enforce strict access controls and monitor user activities to detect anomalous file uploads or privilege escalations. Implementing multi-factor authentication (MFA) can reduce the risk of credential compromise. Regularly auditing and restricting user permissions to only those necessary for their role will minimize the number of users who can upload files. Network segmentation and application-layer firewalls can further limit the impact of a successful exploit. Finally, organizations should maintain up-to-date backups and have incident response plans ready to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2022-46157: CWE-94: Improper Control of Generation of Code ('Code Injection') in akeneo pim-community-dev
Description
Akeneo PIM is an open source Product Information Management (PIM). Akeneo PIM Community Edition versions before v5.0.119 and v6.0.53 allows remote authenticated users to execute arbitrary PHP code on the server by uploading a crafted image. Akeneo PIM Community Edition after the versions aforementioned provides patched Apache HTTP server configuration file, for docker setup and in documentation sample, to fix this vulnerability. Community Edition users must change their Apache HTTP server configuration accordingly to be protected. The patch for Cloud Based Akeneo PIM Services customers has been applied since 30th October 2022. Users are advised to upgrade. Users unable to upgrade may Replace any reference to `<FilesMatch \.php$>` in their apache httpd configurations with: `<Location "/index.php">`.
AI-Powered Analysis
Technical Analysis
CVE-2022-46157 is a code injection vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting Akeneo PIM Community Edition, an open-source Product Information Management system widely used for managing product data. The vulnerability exists in versions prior to 5.0.119 and between 6.0.0 and 6.0.53. It allows remote authenticated users to execute arbitrary PHP code on the server by uploading a specially crafted image file. This occurs because the application insufficiently validates or sanitizes uploaded image files, enabling malicious code embedded within these files to be executed by the server. The vulnerability is particularly dangerous as it leads to remote code execution (RCE), which can compromise the confidentiality, integrity, and availability of the affected system. The issue is mitigated by changes in the Apache HTTP server configuration, specifically replacing any <FilesMatch \.php$> directives with <Location "/index.php"> to prevent direct execution of uploaded PHP code. Cloud-based Akeneo PIM services have been patched since October 30, 2022, but on-premises Community Edition users must manually update their Apache configurations or upgrade to patched versions to remediate the vulnerability. Exploitation requires authentication, meaning an attacker must have valid user credentials to upload the malicious image, but no further user interaction is needed once authenticated. There are no known exploits in the wild at this time, but the potential impact of successful exploitation is significant due to the ability to execute arbitrary code remotely.
Potential Impact
For European organizations using Akeneo PIM Community Edition, this vulnerability poses a substantial risk. Successful exploitation can lead to full server compromise, allowing attackers to access sensitive product data, intellectual property, and potentially pivot to other internal systems. This can disrupt business operations, damage reputation, and lead to regulatory compliance issues under GDPR due to unauthorized data access or alteration. Since Akeneo PIM is used in retail, manufacturing, and e-commerce sectors, industries critical to European economies could be affected. The requirement for authentication limits the attack surface to insiders or compromised accounts, but insider threats or credential theft could facilitate exploitation. The vulnerability's ability to execute arbitrary PHP code means attackers could deploy backdoors, ransomware, or exfiltrate data, severely impacting availability and integrity of services. Organizations relying on outdated versions or improper Apache configurations remain vulnerable, increasing their risk exposure.
Mitigation Recommendations
European organizations should prioritize upgrading Akeneo PIM Community Edition to versions 5.0.119 or later and 6.0.53 or later where the vulnerability is patched. For those unable to upgrade immediately, it is critical to modify the Apache HTTP server configuration by replacing any <FilesMatch \.php$> directives with <Location "/index.php"> to block direct execution of uploaded PHP files. Additionally, organizations should enforce strict access controls and monitor user activities to detect anomalous file uploads or privilege escalations. Implementing multi-factor authentication (MFA) can reduce the risk of credential compromise. Regularly auditing and restricting user permissions to only those necessary for their role will minimize the number of users who can upload files. Network segmentation and application-layer firewalls can further limit the impact of a successful exploit. Finally, organizations should maintain up-to-date backups and have incident response plans ready to quickly recover from potential compromises.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-11-28T17:27:19.996Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6ec0
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 8:07:00 PM
Last updated: 8/14/2025, 12:45:36 AM
Views: 15
Related Threats
CVE-2025-8972: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-51986: n/a
UnknownCVE-2025-52335: n/a
HighCVE-2025-8971: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-8970: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.