<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2022-50944 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2022-50944/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 10 May 2026 13:22:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2022-50944/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2022-50944: Aero CMS 0.0.1 PHP Code Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-aero-cms-php-code-injection/</link><pubDate>Sun, 10 May 2026 13:22:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-aero-cms-php-code-injection/</guid><description>Aero CMS 0.0.1 is vulnerable to PHP code injection (CVE-2022-50944), allowing an authenticated attacker to execute arbitrary PHP code by uploading malicious files through the image parameter, leading to remote code execution on the server.</description><content:encoded><![CDATA[<p>Aero CMS 0.0.1 is susceptible to a PHP code injection vulnerability identified as CVE-2022-50944. This flaw allows authenticated attackers to inject and execute arbitrary PHP code on the affected server. The vulnerability is triggered by uploading a malicious PHP file through the <code>image</code> parameter when adding or modifying a post. Specifically, an attacker can send a crafted request to the <code>/admin/posts.php</code> endpoint with the <code>source=add_post</code> parameter, containing PHP code embedded within an image file. Successful exploitation allows the attacker to gain remote code execution, potentially leading to full system compromise. This poses a significant risk to organizations using Aero CMS 0.0.1, as it could enable data theft, service disruption, or further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the Aero CMS application.</li>
<li>Attacker crafts a malicious PHP file containing code to be executed on the server.</li>
<li>Attacker accesses the <code>/admin/posts.php</code> endpoint with the <code>source=add_post</code> parameter.</li>
<li>Attacker uploads the malicious PHP file through the <code>image</code> parameter in a POST request to <code>/admin/posts.php</code>.</li>
<li>The application saves the uploaded file to a directory accessible by the webserver.</li>
<li>The attacker crafts a request to directly access the uploaded PHP file via HTTP.</li>
<li>The webserver executes the PHP code within the uploaded file.</li>
<li>Attacker achieves remote code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2022-50944) allows an attacker to execute arbitrary PHP code on the server hosting Aero CMS 0.0.1. This could lead to complete compromise of the affected system, including the ability to read sensitive data, modify website content, install malware, or pivot to other systems on the network. The vulnerability has a CVSS v3.1 score of 8.8, indicating a high severity. While the number of victims is unknown, any system running the vulnerable version of Aero CMS is at risk if authentication is compromised.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Aero CMS if available; otherwise, discontinue use of the product.</li>
<li>Implement strict input validation on the <code>image</code> parameter to prevent the upload of PHP files to mitigate CVE-2022-50944.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PHP File Upload via Image Parameter</code> to identify attempts to upload malicious PHP files to the <code>/admin/posts.php</code> endpoint.</li>
<li>Monitor web server logs for suspicious requests to <code>/admin/posts.php</code> with the <code>source=add_post</code> parameter and PHP files uploaded through the <code>image</code> parameter to identify potential exploitation attempts, as described in the attack chain.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>code-injection</category><category>php</category><category>web-application</category><category>cve-2022-50944</category></item></channel></rss>