Enviar #772855: CMSMadeSimple CMS Made Simple (CMSMS) 2.2.22 and old versions modules/UserGuide/lib/class.UserGuideImporterExporter.phpinformación

TítuloCMSMadeSimple CMS Made Simple (CMSMS) 2.2.22 and old versions modules/UserGuide/lib/class.UserGuideImporterExporter.php
DescripciónCMS Made Simple (CMSMS) version 2.2.22 and earlier contains a path traversal vulnerability in the UserGuide module's XML import functionality. The _copyFilesToFolder() function in modules/UserGuide/lib/class.UserGuideImporterExporter.php fails to properly sanitize user-supplied filenames and directory paths from imported XML files. An authenticated administrator can exploit this vulnerability by uploading a specially crafted XML file containing path traversal sequences (../) and base64-encoded malicious code, allowing arbitrary file uploads to any location on the server file system. This can lead to remote code execution, complete server compromise, data theft, and denial of service. The vulnerability affects the default installation with no additional configuration required. CVSS v3.1 Base Score: 7.2 (HIGH) CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CWE-22: Improper Limitation of a Pathname to a Restricted Directory CWE-434: Unrestricted Upload of File with Dangerous Type
Fuente⚠️ https://drive.proton.me/urls/Q0JHZ339BW#X9P2G3Guwvwa
Usuario
 caginkyr (UID 96143)
Sumisión2026-03-05 13:03 (hace 27 días)
Moderación2026-03-31 10:40 (26 days later)
EstadoAceptado
Entrada de VulDB354331 [CMS Made Simple hasta 2.2.22 UserGuide Module XML Import class.UserGuideImporterExporter.php _copyFilesToFolder recorrido de directorios]
Puntos20

Do you know our Splunk app?

Download it now for free!