Submit #772855: CMSMadeSimple CMS Made Simple (CMSMS) 2.2.22 and old versions modules/UserGuide/lib/class.UserGuideImporterExporter.phpinfo

TitelCMSMadeSimple CMS Made Simple (CMSMS) 2.2.22 and old versions modules/UserGuide/lib/class.UserGuideImporterExporter.php
BeschreibungCMS Made Simple (CMSMS) version 2.2.22 and earlier contains a path traversal vulnerability in the UserGuide module's XML import functionality. The _copyFilesToFolder() function in modules/UserGuide/lib/class.UserGuideImporterExporter.php fails to properly sanitize user-supplied filenames and directory paths from imported XML files. An authenticated administrator can exploit this vulnerability by uploading a specially crafted XML file containing path traversal sequences (../) and base64-encoded malicious code, allowing arbitrary file uploads to any location on the server file system. This can lead to remote code execution, complete server compromise, data theft, and denial of service. The vulnerability affects the default installation with no additional configuration required. CVSS v3.1 Base Score: 7.2 (HIGH) CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CWE-22: Improper Limitation of a Pathname to a Restricted Directory CWE-434: Unrestricted Upload of File with Dangerous Type
Quelle⚠️ https://drive.proton.me/urls/Q0JHZ339BW#X9P2G3Guwvwa
Benutzer
 caginkyr (UID 96143)
Einreichung05.03.2026 13:03 (vor 1 Monat)
Moderieren31.03.2026 10:40 (26 days later)
StatusAkzeptiert
VulDB Eintrag354331 [CMS Made Simple bis 2.2.22 UserGuide Module XML Import class.UserGuideImporterExporter.php _copyFilesToFolder Directory Traversal]
Punkte20

Do you know our Splunk app?

Download it now for free!