CVE-2022-39297
HIGHMelistechnology Meliscms < 5.0.1 - Insecure Deserialization
Title source: ruleDescription
MelisCms provides a full CMS for Melis Platform, including templating system, drag'n'drop of plugins, SEO and many administration tools. Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-cms`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-cms` >= 5.0.1. This issue was addressed by restricting allowed classes when deserializing user-controlled data.
Scores
CVSS v3
7.7
EPSS
0.0089
EPSS Percentile
75.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
Classification
CWE
CWE-502
Status
published
Affected Products (2)
melistechnology/meliscms
< 5.0.1
melisplatform/melis-cms
< 5.0.1Packagist
Timeline
Published
Oct 12, 2022
Tracked Since
Feb 18, 2026