VYPR
High severityNVD Advisory· Published Feb 26, 2022· Updated Aug 3, 2024

CVE-2022-26149

CVE-2022-26149

Description

MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MODX Revolution 2.8.3-pl and earlier allow authenticated administrators to upload and execute arbitrary code by modifying the Uploadable File Types setting.

Vulnerability

MODX Revolution through version 2.8.3-pl contains a vulnerability where remote authenticated administrators can upload arbitrary executable files. The flaw lies in the ability for an administrator to change the "Uploadable File Types" configuration setting, thus permitting file types (such as .php, .phtml, or .shtml) that can be executed by the web server [1]. By altering this setting, an administrator can bypass the default file type restrictions and upload a malicious executable file.

Exploitation

To exploit CVE-2022-26149, an attacker must first acquire valid administrator credentials for the MODX Revolution instance. Once authenticated, the attacker navigates to the system settings and modifies the "Uploadable File Types" field to include dangerous extensions such as .php. The attacker then uploads a crafted executable file (e.g., a web shell) via the media manager or any file upload interface. No additional privileges or network position beyond administrator access are required [1][2].

Impact

Successful exploitation allows the attacker to execute arbitrary PHP code on the web server, interpreted in the context of the MODX application. This can lead to complete compromise of the CMS, including reading, writing, and deletion of files, access to the database, lateral movement within the hosting environment, and potential privilege escalation on the underlying operating system [1][2].

Mitigation

The MODX Revolution project has released version 2.8.4-pl, which addresses this vulnerability by restricting the ability to modify the Uploadable File Types setting to only super administrators or by enforcing additional validation [1][2]. Users are advised to upgrade to 2.8.4-pl or later immediately. As a workaround, administrators can audit their current user roles and ensure that only trusted users have system administration privileges. The vulnerability is not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog as of the publication date.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
modx/revolutionPackagist
<= 2.8.3-pl

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.