CVE-2020-22755
Description
File upload vulnerability in MCMS 5.0 allows attackers to execute arbitrary code via a crafted thumbnail. A different vulnerability than CVE-2022-31943.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MCMS 5.0 suffers from a file upload vulnerability allowing arbitrary code execution via crafted thumbnail filenames and directory traversal.
Vulnerability
Description
CVE-2020-22755 is a file upload vulnerability in MCMS 5.0, a Java-based content management system. The root cause lies in insufficient validation of filenames during thumbnail uploads in the article management feature. The system blocks executable extensions like .jsp and .exe, but fails to handle filenames ending with a trailing dot (e.g., malicious.jsp.). On Windows servers, the operating system automatically strips the trailing dot, resulting in a valid .jsp file being written to disk. [3]
Attack
Vector
An attacker must have access to the article management interface, which typically requires authenticated credentials. The attack exploits two weaknesses: first, a bypass of extension filtering by appending a dot after the prohibited extension (e.g., .jsp.); second, a directory traversal vulnerability that allows the attacker to modify the uploadPath parameter or include ../ sequences to place the uploaded file into an arbitrary directory, such as the web root. No special network position is required beyond being able to send crafted HTTP requests to the MCMS instance. [3]
Impact
Successful exploitation enables an attacker to upload arbitrary files, including web shells (.jsp files), to any location on the server. This leads to remote code execution under the context of the web application, giving the attacker full control over the CMS, its data, and potentially the host server. The vulnerability is distinct from CVE-2022-31943, as noted in the official description. [1][2]
Mitigation
As of the latest disclosure, MCMS 5.0 is affected. The vendor, MingSoft, maintains the project on GitHub, and users are advised to review the issue tracker for any available patches or workarounds. Because the attack relies on both extension bypass and directory traversal, input sanitization for filenames and path parameters should be implemented. No evidence of CVE-2020-22755 being listed in CISA KEV was found. [1][3]
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
net.mingsoft:ms-mcmsMaven | <= 5.0.0 | — |
Affected products
2- MCMS/MCMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-293v-5329-36wpghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-22755ghsaADVISORY
- github.com/ming-soft/MCMS/issues/42ghsaWEB
News mentions
0No linked articles in our index yet.