Skip to main content

CVE-2022-46157: CWE-94: Improper Control of Generation of Code ('Code Injection') in akeneo pim-community-dev

Medium
Published: Fri Dec 09 2022 (12/09/2022, 20:14:33 UTC)
Source: CVE
Vendor/Project: akeneo
Product: pim-community-dev

Description

Akeneo PIM is an open source Product Information Management (PIM). Akeneo PIM Community Edition versions before v5.0.119 and v6.0.53 allows remote authenticated users to execute arbitrary PHP code on the server by uploading a crafted image. Akeneo PIM Community Edition after the versions aforementioned provides patched Apache HTTP server configuration file, for docker setup and in documentation sample, to fix this vulnerability. Community Edition users must change their Apache HTTP server configuration accordingly to be protected. The patch for Cloud Based Akeneo PIM Services customers has been applied since 30th October 2022. Users are advised to upgrade. Users unable to upgrade may Replace any reference to `<FilesMatch \.php$>` in their apache httpd configurations with: `<Location "/index.php">`.

AI-Powered Analysis

AILast updated: 06/21/2025, 20:07:00 UTC

Technical Analysis

CVE-2022-46157 is a code injection vulnerability classified under CWE-94 (Improper Control of Generation of Code) affecting Akeneo PIM Community Edition, an open-source Product Information Management system widely used for managing product data. The vulnerability exists in versions prior to 5.0.119 and between 6.0.0 and 6.0.53. It allows remote authenticated users to execute arbitrary PHP code on the server by uploading a specially crafted image file. This occurs because the application insufficiently validates or sanitizes uploaded image files, enabling malicious code embedded within these files to be executed by the server. The vulnerability is particularly dangerous as it leads to remote code execution (RCE), which can compromise the confidentiality, integrity, and availability of the affected system. The issue is mitigated by changes in the Apache HTTP server configuration, specifically replacing any <FilesMatch \.php$> directives with <Location "/index.php"> to prevent direct execution of uploaded PHP code. Cloud-based Akeneo PIM services have been patched since October 30, 2022, but on-premises Community Edition users must manually update their Apache configurations or upgrade to patched versions to remediate the vulnerability. Exploitation requires authentication, meaning an attacker must have valid user credentials to upload the malicious image, but no further user interaction is needed once authenticated. There are no known exploits in the wild at this time, but the potential impact of successful exploitation is significant due to the ability to execute arbitrary code remotely.

Potential Impact

For European organizations using Akeneo PIM Community Edition, this vulnerability poses a substantial risk. Successful exploitation can lead to full server compromise, allowing attackers to access sensitive product data, intellectual property, and potentially pivot to other internal systems. This can disrupt business operations, damage reputation, and lead to regulatory compliance issues under GDPR due to unauthorized data access or alteration. Since Akeneo PIM is used in retail, manufacturing, and e-commerce sectors, industries critical to European economies could be affected. The requirement for authentication limits the attack surface to insiders or compromised accounts, but insider threats or credential theft could facilitate exploitation. The vulnerability's ability to execute arbitrary PHP code means attackers could deploy backdoors, ransomware, or exfiltrate data, severely impacting availability and integrity of services. Organizations relying on outdated versions or improper Apache configurations remain vulnerable, increasing their risk exposure.

Mitigation Recommendations

European organizations should prioritize upgrading Akeneo PIM Community Edition to versions 5.0.119 or later and 6.0.53 or later where the vulnerability is patched. For those unable to upgrade immediately, it is critical to modify the Apache HTTP server configuration by replacing any <FilesMatch \.php$> directives with <Location "/index.php"> to block direct execution of uploaded PHP files. Additionally, organizations should enforce strict access controls and monitor user activities to detect anomalous file uploads or privilege escalations. Implementing multi-factor authentication (MFA) can reduce the risk of credential compromise. Regularly auditing and restricting user permissions to only those necessary for their role will minimize the number of users who can upload files. Network segmentation and application-layer firewalls can further limit the impact of a successful exploit. Finally, organizations should maintain up-to-date backups and have incident response plans ready to quickly recover from potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-11-28T17:27:19.996Z
Cisa Enriched
true

Threat ID: 682d9849c4522896dcbf6ec0

Added to database: 5/21/2025, 9:09:29 AM

Last enriched: 6/21/2025, 8:07:00 PM

Last updated: 8/14/2025, 12:45:36 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats