VYPR
Critical severityNVD Advisory· Published Apr 12, 2022· Updated Aug 3, 2024

CVE-2022-27952

CVE-2022-27952

Description

An arbitrary file upload vulnerability in the file upload module of PayloadCMS v0.15.0 allows attackers to execute arbitrary code via a crafted SVG file.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Arbitrary file upload in PayloadCMS v0.15.0 allows code execution via crafted SVG file.

Vulnerability

An arbitrary file upload vulnerability exists in the file upload module of PayloadCMS version 0.15.0 [2]. The vulnerability allows an attacker to upload a crafted SVG file that bypasses file type validation, potentially leading to arbitrary code execution on the server.

Exploitation

An attacker with access to the file upload functionality can upload a specially crafted SVG file containing malicious code [2]. The lack of proper sanitization or validation of SVG content enables the attacker to execute arbitrary code on the underlying server.

Impact

Successful exploitation allows the attacker to execute arbitrary code on the server, which can lead to full compromise of the CMS, including data theft, modification, or further network attacks [2].

Mitigation

As of the publication date (2022-04-12), no official fix or workaround has been disclosed in the available references [2]. Users of PayloadCMS v0.15.0 should monitor the project's GitHub repository for updates and consider restricting file upload functionality to trusted users only until a patch is released.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
payloadnpm
< 0.15.10.15.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.