CVE-2022-25369

9.8 CRITICAL

📋 TL;DR

CVE-2022-25369 is an authentication bypass vulnerability in Dynamicweb CMS that allows unauthenticated attackers to create new administrator accounts. Once authenticated as admin, attackers can upload executable files leading to remote code execution. All Dynamicweb installations before patched versions are affected.

💻 Affected Systems

Products:
  • Dynamicweb CMS
Versions: All versions before 9.5.9, 9.6.16, 9.7.8, 9.8.11, 9.9.8, 9.10.18, 9.12.8, and 9.13.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all Dynamicweb installations with default configuration. The vulnerability exists in the setup logic that should be disabled after initial installation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full administrative control, executing arbitrary commands, and potentially pivoting to other systems.

🟠

Likely Case

Attacker creates admin account, uploads web shell or malicious payload, and gains persistent access to the web server with elevated privileges.

🟢

If Mitigated

Attack prevented through proper patching, network segmentation, and access controls limiting impact to isolated web application.

🌐 Internet-Facing: HIGH - This is an unauthenticated vulnerability affecting web applications directly exposed to the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires network access to the Dynamicweb instance.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available. Attack chain is straightforward: bypass authentication, create admin user, upload malicious file, execute commands.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.5.9, 9.6.16, 9.7.8, 9.8.11, 9.9.8, 9.10.18, 9.12.8, or 9.13.0+

Vendor Advisory: https://www.dynamicweb.com/resources/downloads?Category=Releases

Restart Required: Yes

Instructions:

1. Backup your Dynamicweb installation and database. 2. Download appropriate patched version from Dynamicweb downloads. 3. Follow Dynamicweb upgrade documentation for your version. 4. Restart application/services. 5. Verify setup functionality is properly disabled.

🔧 Temporary Workarounds

Disable Setup Endpoints

all

Block access to Dynamicweb setup and installation endpoints via web server configuration or firewall rules.

# For Apache: RewriteRule ^/Admin/Public/Setup/.*$ - [F,L]
# For IIS: Add URL rewrite rule to block /Admin/Public/Setup/*
# For Nginx: location ~ ^/Admin/Public/Setup/ { return 403; }

Network Segmentation

all

Restrict access to Dynamicweb administration interface to trusted IP addresses only.

# Example firewall rule (Linux): iptables -A INPUT -p tcp --dport 80 -s TRUSTED_IP -j ACCEPT
# Windows Firewall: New inbound rule restricting port 80/443 to specific IPs

🧯 If You Can't Patch

  • Implement strict network access controls to limit Dynamicweb access to trusted sources only
  • Deploy web application firewall (WAF) with rules to detect and block setup endpoint access attempts

🔍 How to Verify

Check if Vulnerable:

Check if setup endpoints are accessible by attempting to access /Admin/Public/Setup/ via browser or curl. If accessible and installation appears incomplete, system is vulnerable.

Check Version:

Check Dynamicweb version in administration interface or examine web.config/Global.asax files for version information.

Verify Fix Applied:

Verify setup endpoints return 403/404 errors and check Dynamicweb version matches patched versions. Test admin user creation attempts fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /Admin/Public/Setup/ endpoints
  • New administrator user creation from unexpected IP addresses
  • File uploads to unusual locations with executable extensions

Network Indicators:

  • HTTP requests to setup endpoints from external/untrusted sources
  • Sudden increase in admin interface traffic from new IPs

SIEM Query:

source="web_logs" AND (uri_path="/Admin/Public/Setup/*" OR (event="user_created" AND user_role="administrator"))

🔗 References

📤 Share & Export