{"id":"CVE-2022-24977","details":"ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.","aliases":["GHSA-389p-fchr-q2mg"],"modified":"2026-04-12T04:41:48.303603Z","published":"2022-02-14T12:15:27.867Z","references":[{"type":"FIX","url":"https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261"},{"type":"FIX","url":"https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2"},{"type":"EVIDENCE","url":"https://r0.haxors.org/posts?id=8"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/impresscms/impresscms","events":[{"introduced":"0"},{"fixed":"2e3f2b3963ebfa4e5dcaf50c31ff4daa1eb901be"},{"fixed":"a66d7bb499faafab803e24833606028fa0ba4261"}],"database_specific":{"cpe":"cpe:2.3:a:impresscms:impresscms:*:*:*:*:*:*:*:*","source":["CPE_FIELD","REFERENCES"],"extracted_events":[{"introduced":"0"},{"fixed":"1.4.2"}]}}],"versions":["1.3.10-beta","1.3.8","1.3.9","1.3.9_rc","impresscms_1.3.3","impresscms_1.3.4","v1.3.10","v1.3.11","v1.3.11-beta","v1.3.11-beta2","v1.3.11-rc","v1.3.11-rc2","v1.3.8","v1.4.0","v1.4.0-alpha","v1.4.0-alpha.2","v1.4.0-beta","v1.4.0-rc","v1.4.2","v1.4.2_rc"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24977.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}