First published: Tue Sep 13 2022(Updated: )
CuppaCMS 1.0 is vulnerable to Remote Code Execution (RCE). An authenticated user can control both parameters (action and function) from "/api/index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tina Tinacms | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37190 is classified as a critical vulnerability due to its potential for Remote Code Execution (RCE).
To fix CVE-2022-37190, upgrade to a patched version of CuppaCMS that addresses this RCE vulnerability and ensures proper input validation.
CVE-2022-37190 affects users of CuppaCMS version 1.0, specifically authenticated users with access to the API.
The risks include unauthorized remote code execution, which could allow attackers to gain control of the server and compromise sensitive data.
Yes, exploitation of CVE-2022-37190 requires an authenticated user to manipulate parameters in the CuppaCMS API.