VYPR
High severityNVD Advisory· Published Apr 22, 2022· Updated Aug 3, 2024

CVE-2022-27340

CVE-2022-27340

Description

MCMS v5.2.7 contains a Cross-Site Request Forgery (CSRF) via /role/saveOrUpdateRole.do. This vulnerability allows attackers to escalate privileges and modify data.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MCMS v5.2.7 is vulnerable to CSRF via /role/saveOrUpdateRole.do, allowing privilege escalation and data modification.

Vulnerability

MCMS v5.2.7, a Java-based content management system, contains a Cross-Site Request Forgery (CSRF) vulnerability in the /role/saveOrUpdateRole.do endpoint. This endpoint is used to create or update user roles. The application does not implement any anti-CSRF tokens or other validation mechanisms to ensure that requests originate from an authenticated user's session. The vulnerability is present in the version as released on the official GitHub repository [1].

Exploitation

An attacker can craft a malicious HTML page or email that, when visited by an authenticated administrator, triggers a forged request to /role/saveOrUpdateRole.do. The attacker does not need any special network position beyond being able to deliver the payload to the victim (e.g., via a link or embedded content). No authentication is required for the attacker; the victim must be logged into MCMS with administrative privileges. The forged request can include arbitrary parameters to modify existing roles or create new roles with elevated permissions.

Impact

Successful exploitation allows the attacker to escalate privileges by modifying role permissions or creating new administrative accounts. This can lead to full compromise of the MCMS instance, including unauthorized access to sensitive data, modification of site content, and potential lateral movement within the hosting environment. The impact is high as it directly affects the integrity and confidentiality of the system.

Mitigation

As of the publication date (2022-04-22), no official patch or fixed version has been released by the vendor. The available references do not provide a workaround or mitigation steps [2]. Users should monitor the MCMS repository for updates and consider implementing generic CSRF protections, such as adding anti-CSRF tokens to sensitive endpoints, until a patch is available.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
net.mingsoft:ms-mcmsMaven
<= 5.2.7

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.