CVE-2022-50916
Published: 13 January 2026
Summary
CVE-2022-50916 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in E107 E107. Its CVSS base score is 7.2 (High).
Operationally, ranked at the 27.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.
Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.
Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.
Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.
NVD Description
e107 CMS version 3.2.1 contains a file upload vulnerability that allows authenticated administrators to override server files through the Media Manager import functionality. Attackers can exploit the upload mechanism by manipulating the upload URL parameter to overwrite existing files like…
more
top.php in the web application directory.
Deeper analysisAI
CVE-2022-50916 is a file upload vulnerability in e107 CMS version 3.2.1, specifically within the Media Manager import functionality. It enables authenticated administrators to override existing server files, such as top.php in the web application directory, by manipulating the upload URL parameter. The issue is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high confidentiality, integrity, and availability impacts.
The vulnerability can be exploited by authenticated administrators with network access, requiring low attack complexity and no user interaction. By crafting a malicious upload request and altering the URL parameter, an attacker can overwrite critical files on the server, potentially granting them the ability to execute arbitrary code, modify application behavior, or achieve full server compromise.
Advisories and related resources include the official e107.org site, its download page for potential updates, an Exploit-DB entry at https://www.exploit-db.com/exploits/50910 detailing the exploit, and a Vulncheck advisory at https://www.vulncheck.com/advisories/e-cms-upload-restriction-bypass-authenticated-admin-server-file-override, which security practitioners should consult for mitigation steps and patch availability.
Details
- CWE(s)