CVE-2022-21705
📋 TL;DR
This CVE allows authenticated users with page management permissions in OctoberCMS to bypass safe mode restrictions and execute arbitrary code through improper input sanitization. It affects admin panels relying on safe mode and restricted permissions. Attackers must first gain backend access to exploit this vulnerability.
💻 Affected Systems
- OctoberCMS
📦 What is this software?
October by Octobercms
October by Octobercms
October by Octobercms
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with remote code execution, allowing attackers to install malware, exfiltrate data, or pivot to other systems.
Likely Case
Authenticated attackers with page management permissions can execute arbitrary code within the CMS context, potentially gaining full control over the website.
If Mitigated
With proper access controls and monitoring, impact is limited to authorized users abusing their legitimate permissions.
🎯 Exploit Status
Requires authenticated access with page creation/modification/deletion permissions
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Build 474 (v1.0.474) or v1.1.10
Vendor Advisory: https://github.com/octobercms/october/security/advisories/GHSA-79jw-2f46-wv22
Restart Required: No
Instructions:
1. Update OctoberCMS to Build 474 or v1.1.10 via composer update. 2. Alternatively, manually apply commit c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe to your installation.
🔧 Temporary Workarounds
Disable page management for untrusted users
allRemove page creation, modification, and deletion permissions from users who don't absolutely need them
Implement additional input validation
allAdd custom validation rules for all user input in page management functionality
🧯 If You Can't Patch
- Restrict backend access to trusted IP addresses only
- Implement strict monitoring of page management activities and review all changes
🔍 How to Verify
Check if Vulnerable:
Check OctoberCMS version via admin panel or by examining composer.json file
Check Version:
php artisan october:version
Verify Fix Applied:
Verify version is Build 474 or higher for v1.0.x, or v1.1.10 or higher for v1.1.x
📡 Detection & Monitoring
Log Indicators:
- Unusual page creation/modification patterns
- Suspicious PHP code in page content
- Multiple failed login attempts followed by page management activities
Network Indicators:
- Unusual outbound connections from CMS server
- Requests to page management endpoints from unexpected sources
SIEM Query:
source="octobercms" AND (event="page_created" OR event="page_modified") AND user NOT IN ["trusted_users"]
🔗 References
- https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe
- https://github.com/octobercms/october/security/advisories/GHSA-79jw-2f46-wv22
- https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe
- https://github.com/octobercms/october/security/advisories/GHSA-79jw-2f46-wv22