VYPR
High severityNVD Advisory· Published Feb 18, 2022· Updated Aug 4, 2024

CVE-2021-46062

CVE-2021-46062

Description

MCMS v5.2.5 was discovered to contain an arbitrary file deletion vulnerability via the component oldFileName.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MCMS v5.2.5 suffers from an arbitrary file deletion vulnerability via the `oldFileName` parameter in the template management component.

Vulnerability

MCMS version 5.2.5, a content management system, contains an arbitrary file deletion vulnerability. The flaw resides in the net/mingsoft/basic/action/TemplateAction.java file, where the oldFileName parameter is passed to FileUtil.class without proper sanitization or validation, allowing deletion of any file on the server. The vulnerable code path is reachable via the background template management function, which requires prior authentication as an administrator. [1], [2]

Exploitation

To exploit this vulnerability, an attacker must have access to the admin panel (background) and navigate to System Settings > Template Management. By crafting an HTTP request with the oldFileName parameter set to an arbitrary file path (e.g., fileName=x&oldFileName=/etc/passwd), the application will invoke the file deletion routine. No additional privileges or special conditions are required beyond administrative access. [2]

Impact

Successful exploitation allows an authenticated attacker to delete arbitrary files on the server, potentially causing denial of service, data loss, or enabling further compromise of the system (e.g., deleting critical configuration files or application binaries). The impact is limited by the requirement for administrative credentials but can be severe in terms of availability and integrity. [1], [2]

Mitigation

As of the publication date (February 18, 2022), no official patched version of MCMS had been released. The vendor (ming-soft) has acknowledged the issue via a GitHub issue, but no fix is available. Administrators should restrict access to the admin panel, apply strict file system permissions, and consider implementing a web application firewall (WAF) rule to block requests with suspicious oldFileName values. [1], [2]

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
net.mingsoft:ms-basicMaven
< 2.1.162.1.16
net.mingsoft:ms-mcmsMaven
< 5.2.115.2.11

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.