{"id":"CVE-2022-27952","details":"An arbitrary file upload vulnerability in the file upload module of PayloadCMS v0.15.0 allows attackers to execute arbitrary code via a crafted SVG file.","aliases":["GHSA-w8xh-93qh-35vw"],"modified":"2026-04-12T06:00:02.607217Z","published":"2022-04-12T17:15:10.480Z","references":[{"type":"ADVISORY","url":"https://github.com/payloadcms/payload"},{"type":"EVIDENCE","url":"https://www.youtube.com/watch?v=6CfhAxA3xdQ"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/payloadcms/payload","events":[{"introduced":"0"},{"last_affected":"9b17b5c08c2f730e925ac266eb6ed9a9384ef538"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"0.15.0"}],"cpe":"cpe:2.3:a:payloadcms:payload:0.15.0:*:*:*:*:node.js:*:*"}}],"versions":["v0.0.10","v0.0.101","v0.0.102","v0.0.103","v0.0.104","v0.0.105","v0.0.106","v0.0.107","v0.0.108","v0.0.109","v0.0.11","v0.0.110","v0.0.111","v0.0.112","v0.0.113","v0.0.114","v0.0.115","v0.0.116","v0.0.117","v0.0.118","v0.0.119","v0.0.12","v0.0.120","v0.0.121","v0.0.122","v0.0.123","v0.0.124","v0.0.125","v0.0.126","v0.0.128","v0.0.129","v0.0.13","v0.0.130","v0.0.131","v0.0.132","v0.0.133","v0.0.134","v0.0.135","v0.0.136","v0.0.137","v0.0.138","v0.0.139","v0.0.14","v0.0.140","v0.0.141","v0.0.15","v0.0.16","v0.0.17","v0.0.18","v0.0.19","v0.0.2","v0.0.20","v0.0.21","v0.0.22","v0.0.24","v0.0.26","v0.0.27","v0.0.28","v0.0.29","v0.0.3","v0.0.30","v0.0.31","v0.0.32","v0.0.33","v0.0.34","v0.0.35","v0.0.36","v0.0.37","v0.0.38","v0.0.39","v0.0.4","v0.0.40","v0.0.41","v0.0.42","v0.0.43","v0.0.44","v0.0.45","v0.0.46","v0.0.47","v0.0.48","v0.0.49","v0.0.5","v0.0.50","v0.0.51","v0.0.52","v0.0.53","v0.0.54","v0.0.55","v0.0.56","v0.0.57","v0.0.58","v0.0.59","v0.0.6","v0.0.60","v0.0.61","v0.0.62","v0.0.63","v0.0.64","v0.0.65","v0.0.66","v0.0.67","v0.0.68","v0.0.69","v0.0.7","v0.0.70","v0.0.71","v0.0.72","v0.0.73","v0.0.74","v0.0.75","v0.0.76","v0.0.77","v0.0.78","v0.0.79","v0.0.8","v0.0.80","v0.0.81","v0.0.82","v0.0.83","v0.0.84","v0.0.85","v0.0.86","v0.0.87","v0.0.88","v0.0.89","v0.0.9","v0.0.90","v0.0.91","v0.0.92","v0.0.93","v0.0.94","v0.0.95","v0.0.96","v0.0.97","v0.0.98","v0.0.99","v0.1.121","v0.1.122","v0.1.123","v0.1.124","v0.1.125","v0.1.126","v0.1.127","v0.1.138","v0.1.139","v0.1.140","v0.1.141","v0.1.142","v0.1.143","v0.1.144","v0.1.145","v0.1.146","v0.1.16","v0.1.17","v0.1.18","v0.1.19","v0.1.20","v0.10.10","v0.10.11","v0.10.7","v0.11.0","v0.12.0","v0.12.1","v0.12.2","v0.12.3","v0.13.0","v0.13.1","v0.13.2","v0.13.3","v0.13.4","v0.13.5","v0.13.6","v0.14.0","v0.15.0","v0.2.0","v0.2.10","v0.2.11","v0.2.12","v0.2.13","v0.2.2","v0.2.3","v0.2.4","v0.2.5","v0.2.6","v0.2.8","v0.2.9","v0.3.0","v0.5.10","v0.5.7","v0.5.8","v0.5.9","v0.6.0","v0.6.1","v0.6.10","v0.6.2","v0.6.3","v0.6.4","v0.6.5","v0.6.6","v0.6.7","v0.6.8","v0.6.9","v0.7.2","v0.7.3","v0.7.4","v0.7.5","v0.7.6"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-27952.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}