CVE-2022-27340
Description
MCMS v5.2.7 contains a Cross-Site Request Forgery (CSRF) via /role/saveOrUpdateRole.do. This vulnerability allows attackers to escalate privileges and modify data.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
MCMS v5.2.7 is vulnerable to CSRF via /role/saveOrUpdateRole.do, allowing privilege escalation and data modification.
Vulnerability
MCMS v5.2.7, a Java-based content management system, contains a Cross-Site Request Forgery (CSRF) vulnerability in the /role/saveOrUpdateRole.do endpoint. This endpoint is used to create or update user roles. The application does not implement any anti-CSRF tokens or other validation mechanisms to ensure that requests originate from an authenticated user's session. The vulnerability is present in the version as released on the official GitHub repository [1].
Exploitation
An attacker can craft a malicious HTML page or email that, when visited by an authenticated administrator, triggers a forged request to /role/saveOrUpdateRole.do. The attacker does not need any special network position beyond being able to deliver the payload to the victim (e.g., via a link or embedded content). No authentication is required for the attacker; the victim must be logged into MCMS with administrative privileges. The forged request can include arbitrary parameters to modify existing roles or create new roles with elevated permissions.
Impact
Successful exploitation allows the attacker to escalate privileges by modifying role permissions or creating new administrative accounts. This can lead to full compromise of the MCMS instance, including unauthorized access to sensitive data, modification of site content, and potential lateral movement within the hosting environment. The impact is high as it directly affects the integrity and confidentiality of the system.
Mitigation
As of the publication date (2022-04-22), no official patch or fixed version has been released by the vendor. The available references do not provide a workaround or mitigation steps [2]. Users should monitor the MCMS repository for updates and consider implementing generic CSRF protections, such as adding anti-CSRF tokens to sensitive endpoints, until a patch is available.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
net.mingsoft:ms-mcmsMaven | <= 5.2.7 | — |
Affected products
2- MCMS/MCMSdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-g94p-h263-c26qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2022-27340ghsaADVISORY
- github.com/UDKI11/vul/blob/main/Mcms%E8%B7%A8%E7%AB%99%E8%AF%B7%E6%B1%82%E4%BC%AA%E9%80%A0.docxghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.