VYPR
Critical severityNVD Advisory· Published Jul 1, 2022· Updated Aug 3, 2024

CVE-2022-31943

CVE-2022-31943

Description

MCMS v5.2.8 was discovered to contain an arbitrary file upload vulnerability.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

MCMS v5.2.8 allows arbitrary file upload via a zip archive containing a JSP file, bypassing extension filters, leading to remote code execution.

Vulnerability

Description

MCMS v5.2.8 contains an arbitrary file upload vulnerability in its file upload mechanism. The application only blocks file extensions such as .exe, .jsp, .jspx, and .sh, but permits the upload of .zip archives [1]. This oversight allows an attacker to upload a zip file containing a malicious JSP webshell.

Exploitation

An authenticated attacker with access to the article thumbnail upload feature can upload a crafted zip archive. By subsequently invoking the template action that parses zip files (TemplateAction.class), the system extracts the archive and deploys the embedded JSP file to the server [3]. No additional authentication is required beyond the initial upload privileges.

Impact

Successful exploitation enables the attacker to execute arbitrary code on the server via the uploaded JSP webshell. This can lead to full compromise of the MCMS application and the underlying server, including data theft, defacement, or further lateral movement.

Mitigation

As of the publication date, no official patch has been released. Users should restrict upload permissions to trusted administrators, implement strict file type validation on the server side, and consider disabling the zip parsing functionality if not required.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.