VYPR
High severityNVD Advisory· Published Jul 27, 2022· Updated Aug 3, 2024

CVE-2022-34971

CVE-2022-34971

Description

An arbitrary file upload vulnerability in the Advertising Management module of Feehi CMS v2.1.1 allows attackers to execute arbitrary code via a crafted PHP file.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Feehi CMS v2.1.1 Advertising Management module allows arbitrary PHP file upload, leading to remote code execution.

Vulnerability

Overview

The Advertising Management module in Feehi CMS v2.1.1 contains an arbitrary file upload vulnerability. The application does not properly validate the file type of uploaded images, allowing an attacker to upload a crafted PHP file by simply changing the file's extension to .php [1][3]. This stems from insufficient server-side checks on file content or MIME type.

Attack

Vector

An attacker must have access to the Advertising Management module, which typically requires administrator-level authentication in the backend [1]. Once authenticated, the attacker can navigate to the ad management section and, during the file upload process, rename a malicious PHP file (e.g., shell.php) and submit it. The server accepts the file as a valid upload without proper sanitization [3]. No additional network position is required beyond being able to access the admin interface.

Impact

Successful exploitation allows the attacker to execute arbitrary PHP code on the server. This can lead to full compromise of the web application, including data theft, server-side requests, and potential lateral movement within the hosting environment [2]. The vulnerability has been publicly demonstrated with a proof-of-concept (PoC) and is listed in CISA's Known Exploited Vulnerabilities (KEV) catalog [2].

Mitigation

As of the publication date, no official patch has been released for Feehi CMS v2.1.1. Users are advised to restrict access to the admin panel, implement strict file upload validation (e.g., file content inspection and MIME type verification), or consider migration to a supported alternative if the project remains unmaintained [1][2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
feehi/cmsPackagist
<= 2.1.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.