First published: Tue Sep 13 2022(Updated: )
The component "cuppa/api/index.php" of CuppaCMS v1.0 is Vulnerable to LFI. An authenticated user can read system files via crafted POST request using [function] parameter value as LFI payload.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tina Tinacms | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37191 has a high severity due to its potential to allow authenticated users to read sensitive system files.
To fix CVE-2022-37191, you should update CuppaCMS to a version that contains the patch for Local File Inclusion vulnerabilities.
Any user of CuppaCMS version 1.0 is affected by CVE-2022-37191 if they have authenticated access to the system.
CVE-2022-37191 can facilitate Local File Inclusion attacks, allowing attackers to view sensitive files on the server.
Yes, CVE-2022-37191 can be easily exploited by authenticated users through specially crafted POST requests.