CVE-2022-39297

HIGH

Melistechnology Meliscms < 5.0.1 - Insecure Deserialization

Title source: rule
STIX 2.1

Description

MelisCms provides a full CMS for Melis Platform, including templating system, drag'n'drop of plugins, SEO and many administration tools. Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-cms`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-cms` >= 5.0.1. This issue was addressed by restricting allowed classes when deserializing user-controlled data.

Scores

CVSS v3 7.7
EPSS 0.0094
EPSS Percentile 76.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-502
Status published
Products (2)
melisplatform/melis-cms 0 - 5.0.1Packagist
melistechnology/meliscms < 5.0.1
Published Oct 12, 2022
Tracked Since Feb 18, 2026