CVE-2022-25411

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary PHP code on Maxsite CMS v180 installations by uploading a crafted PHP file to the /admin/options endpoint. Any Maxsite CMS v180 installation with the admin interface accessible is affected, potentially leading to complete system compromise.

💻 Affected Systems

Products:
  • Maxsite CMS
Versions: v180
Operating Systems: All operating systems running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: All Maxsite CMS v180 installations are vulnerable by default. The vulnerability exists in the core CMS code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server takeover with attacker gaining full control, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Website defacement, data theft, cryptocurrency mining, or ransomware deployment on vulnerable servers.

🟢

If Mitigated

Limited impact with proper network segmentation, web application firewalls, and restricted admin access.

🌐 Internet-Facing: HIGH - Admin interface accessible from internet allows unauthenticated attackers to exploit this vulnerability remotely.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this if admin interface is accessible.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is straightforward to exploit with publicly available proof-of-concept code. Attackers can upload PHP files without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v181 or later

Vendor Advisory: https://github.com/maxsite/cms/issues/487

Restart Required: No

Instructions:

1. Backup your current installation and database. 2. Download the latest Maxsite CMS version from the official repository. 3. Replace all files except configuration files and uploads directory. 4. Verify the installation works correctly.

🔧 Temporary Workarounds

Block Admin Interface Access

all

Restrict access to /admin/ directory using web server configuration or firewall rules.

# Apache: <Location /admin> Require all denied </Location>
# Nginx: location /admin { deny all; }

Disable File Uploads

all

Remove or restrict file upload functionality in the admin interface.

# Remove or comment out file upload handlers in CMS configuration

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the admin interface
  • Deploy a web application firewall (WAF) with rules to block PHP file uploads to admin endpoints

🔍 How to Verify

Check if Vulnerable:

Check if your Maxsite CMS version is v180 by examining the CMS version file or admin interface.

Check Version:

Check the CMS version in the admin dashboard or examine the version.txt file in the installation directory.

Verify Fix Applied:

After updating, verify the version shows v181 or later and test that PHP file uploads to /admin/options are properly validated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /admin/options endpoint
  • PHP file execution from unexpected locations
  • Multiple failed upload attempts followed by successful PHP upload

Network Indicators:

  • HTTP POST requests to /admin/options with PHP file content
  • Outbound connections from web server to suspicious IPs after file upload

SIEM Query:

source="web_server.log" AND (uri="/admin/options" AND method="POST" AND (file_extension="php" OR content_type="application/x-php"))

🔗 References

📤 Share & Export