VYPR
Unrated severityNVD Advisory· Published Apr 21, 2014· Updated May 6, 2026

CVE-2014-2922

CVE-2014-2922

Description

The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.1.0 does not properly handle an object obtained by unserializing a pathname, which allows remote attackers to conduct PHP object injection attacks and delete arbitrary files via vectors involving a Zend_Http_Response_Stream object.

Affected products

3
  • Pimcore/Pimcore3 versions
    cpe:2.3:a:pimcore:pimcore:2.1.0:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:a:pimcore:pimcore:2.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:pimcore:pimcore:1.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:pimcore:pimcore:1.5.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.