Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-21705Injection in October

CWE-74Injection5 documents5 sources
Severity
7.2HIGHNVD
EPSS
76.6%
top 1.05%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 23

Description

Octobercms is a self-hosted CMS platform based on the Laravel PHP Framework. In affected versions user input was not properly sanitized before rendering. An authenticated user with the permissions to create, modify and delete website pages can exploit this vulnerability to bypass `cms.safe_mode` / `cms.enableSafeMode` in order to execute arbitrary code. This issue only affects admin panels that rely on safe mode and restricted permissions. To exploit this vulnerability, an attacker must first ha

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages3 packages

NVDoctobercms/october1.1.01.1.10+2
CVEListV5octobercms/october>= 1.1.0, < 1.1.10, >= 2.0.0, < 2.1.27+1
Packagistoctober/system1.1.01.1.10+2

Patches

🔴Vulnerability Details

2
OSV
Authenticated remote code execution in October CMS2022-02-23
GHSA
Authenticated remote code execution in October CMS2022-02-23

💥Exploits & PoCs

1
Nuclei
October CMS - Remote Code Execution

📋Vendor Advisories

1
Oracle
Oracle Oracle Communications Risk Matrix: Management (PHP) — CVE-2021-217052022-01-15