CVE-2022-0557: OS Command Injection in Microweber
7.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.93706%
CWE
Published
2/12/2022
Updated
2/3/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
microweber/microweber | composer | < 1.2.11 | 1.2.11 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The patch modifies the file extension validation logic in plupload.php, specifically removing 'php6' from the blocklist. The CWE-78 classification indicates OS command injection, implying the vulnerable code passes untrusted input (e.g., filenames) into system commands without proper sanitization. The exploit demonstrates RCE via .php7 file uploads, which aligns with improper handling of extensions in commands (e.g., using filenames in exec()
calls without escaping). The file path and patch context strongly correlate with the vulnerability mechanism.