CVE-2022-50939
Published: 13 January 2026
Summary
CVE-2022-50939 is a high-severity Path Traversal (CWE-22) vulnerability in E107 E107. Its CVSS base score is 7.2 (High).
Operationally, ranked in the top 27.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Requiring identifiable owners for portable devices reduces the attack surface for unrestricted uploads of dangerous file types via anonymous media.
Dangerous file uploads can be detonated in the chamber to determine malice before any production write or execution occurs.
Prevents unrestricted writing of arbitrary or malicious firmware by keeping hardware write-protect enabled except under tightly controlled manual procedures.
Validates pathnames and filenames to prevent traversal outside intended directories.
Scans files from external sources on download/open/execute, blocking unrestricted uploads of dangerous file types.
NVD Description
e107 CMS version 3.2.1 contains a critical file upload vulnerability that allows authenticated administrators to override arbitrary server files through path traversal. The vulnerability exists in the Media Manager's remote URL upload functionality (image.php) where the upload_caption parameter is not…
more
properly sanitized. An attacker with administrative privileges can use directory traversal sequences (../../../) in the upload_caption field to overwrite critical system files outside the intended upload directory. This can lead to complete compromise of the web application by overwriting configuration files, executable scripts, or other critical system components. The vulnerability was discovered by Hubert Wojciechowski and affects the image.php component in the admin interface.
Deeper analysisAI
CVE-2022-50939 is a critical file upload vulnerability in e107 CMS version 3.2.1, affecting the Media Manager's remote URL upload functionality in the admin interface's image.php component. The issue stems from improper sanitization of the upload_caption parameter, enabling path traversal attacks via directory traversal sequences such as ../../../. This allows overwriting of arbitrary server files outside the intended upload directory, including configuration files, executable scripts, or other critical system components. Discovered by Hubert Wojciechowski, it is associated with CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-434 (Comparison of Classes by Name), with a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
An authenticated administrator can exploit this vulnerability by manipulating the upload_caption field during remote URL uploads in the Media Manager. By injecting path traversal payloads, the attacker can override sensitive files on the server, potentially leading to complete compromise of the web application, such as executing arbitrary code, altering configurations, or disrupting services.
Advisories and related resources, including those from the vendor at e107.org and e107.org/download, a VulnCheck advisory on the upload restriction bypass with path traversal file override, and a proof-of-concept exploit at exploit-db.com/exploits/50910, provide details on the issue. Published on 2026-01-13, these references indicate paths for mitigation, such as applying patches from the vendor's download page.
Details
- CWE(s)