{"api_version":"1","generated_at":"2026-04-24T05:07:04+00:00","cve":"CVE-2022-24247","urls":{"html":"https://cve.report/CVE-2022-24247","api":"https://cve.report/api/cve/CVE-2022-24247.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24247","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24247"},"summary":{"title":"CVE-2022-24247","description":"RiteCMS version 3.1.0 and below suffers from an arbitrary file overwrite via path traversal vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to overwrite any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to write) resulting a remote code execution.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2022-04-12 12:15:00","updated_at":"2022-04-19 18:08:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://www.exploit-db.com/exploits/50614","name":"https://www.exploit-db.com/exploits/50614","refsource":"MISC","tags":[],"title":"RiteCMS 3.1.0 - Arbitrary File Overwrite (Authenticated) - PHP webapps Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://cxsecurity.com/issue/WLB-2022010019","name":"https://cxsecurity.com/issue/WLB-2022010019","refsource":"MISC","tags":[],"title":"RiteCMS 3.1.0 Arbitrary File Overwrite - CXSecurity.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24247","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24247","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"24247","vulnerable":"1","versionEndIncluding":"3.1.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ritecms","cpe5":"ritecms","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2022-24247","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"RiteCMS version 3.1.0 and below suffers from an arbitrary file overwrite via path traversal vulnerability in Admin Panel. Exploiting the vulnerability allows an authenticated attacker to overwrite any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to write) resulting a remote code execution."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.exploit-db.com/exploits/50614","refsource":"MISC","name":"https://www.exploit-db.com/exploits/50614"},{"url":"https://cxsecurity.com/issue/WLB-2022010019","refsource":"MISC","name":"https://cxsecurity.com/issue/WLB-2022010019"}]}},"nvd":{"publishedDate":"2022-04-12 12:15:00","lastModifiedDate":"2022-04-19 18:08:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":1.2,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:C/A:C","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":8.5},"severity":"HIGH","exploitabilityScore":8,"impactScore":9.2,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:ritecms:ritecms:*:*:*:*:*:*:*:*","versionEndIncluding":"3.1.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24247","Ordinal":"227501","Title":"CVE-2022-24247","CVE":"CVE-2022-24247","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24247","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}