{"api_version":"1","generated_at":"2026-04-17T01:44:18+00:00","cve":"CVE-2022-24800","urls":{"html":"https://cve.report/CVE-2022-24800","api":"https://cve.report/api/cve/CVE-2022-24800.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24800","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24800"},"summary":{"title":"CVE-2022-24800","description":"October/System is the system module for October CMS, a self-hosted CMS platform based on the Laravel PHP Framework. Prior to versions 1.0.476, 1.1.12, and 2.2.15, when the developer allows the user to specify their own filename in the `fromData` method, an unauthenticated user can perform remote code execution (RCE) by exploiting a race condition in the temporary storage directory. This vulnerability affects plugins that expose the `October\\Rain\\Database\\Attach\\File::fromData` as a public interface and does not affect vanilla installations of October CMS since this method is not exposed or used by the system internally or externally. The issue has been patched in Build 476 (v1.0.476), v1.1.12, and v2.2.15. Those who are unable to upgrade may apply with patch to their installation manually as a workaround.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-07-12 20:15:00","updated_at":"2022-07-20 11:40:00"},"problem_types":["CWE-362"],"metrics":[],"references":[{"url":"https://github.com/octobercms/library/commit/fe569f3babf3f593be2b1e0a4ae0283506127a83","name":"https://github.com/octobercms/library/commit/fe569f3babf3f593be2b1e0a4ae0283506127a83","refsource":"MISC","tags":[],"title":"Refactor · octobercms/library@fe569f3 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/octobercms/october/security/advisories/GHSA-8v7h-cpc2-r8jp","name":"https://github.com/octobercms/october/security/advisories/GHSA-8v7h-cpc2-r8jp","refsource":"CONFIRM","tags":[],"title":"RCE via race condition in upload process · Advisory · octobercms/october · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24800","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24800","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"24800","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"octobercms","cpe5":"october","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-24800","STATE":"PUBLIC","TITLE":"Race Condition in October CMS upload process"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"october","version":{"version_data":[{"version_value":"< 1.0.476"},{"version_value":">= 1.1.0, < 1.1.12"},{"version_value":">= 2.0.0, < 2.2.15"}]}}]},"vendor_name":"octobercms"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"October/System is the system module for October CMS, a self-hosted CMS platform based on the Laravel PHP Framework. Prior to versions 1.0.476, 1.1.12, and 2.2.15, when the developer allows the user to specify their own filename in the `fromData` method, an unauthenticated user can perform remote code execution (RCE) by exploiting a race condition in the temporary storage directory. This vulnerability affects plugins that expose the `October\\Rain\\Database\\Attach\\File::fromData` as a public interface and does not affect vanilla installations of October CMS since this method is not exposed or used by the system internally or externally. The issue has been patched in Build 476 (v1.0.476), v1.1.12, and v2.2.15. Those who are unable to upgrade may apply with patch to their installation manually as a workaround."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')"}]}]},"references":{"reference_data":[{"name":"https://github.com/octobercms/october/security/advisories/GHSA-8v7h-cpc2-r8jp","refsource":"CONFIRM","url":"https://github.com/octobercms/october/security/advisories/GHSA-8v7h-cpc2-r8jp"},{"name":"https://github.com/octobercms/library/commit/fe569f3babf3f593be2b1e0a4ae0283506127a83","refsource":"MISC","url":"https://github.com/octobercms/library/commit/fe569f3babf3f593be2b1e0a4ae0283506127a83"}]},"source":{"advisory":"GHSA-8v7h-cpc2-r8jp","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-07-12 20:15:00","lastModifiedDate":"2022-07-20 11:40:00","problem_types":["CWE-362"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.8},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.2.15","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*","versionStartIncluding":"1.1.0","versionEndExcluding":"1.1.12","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0.476","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24800","Ordinal":"228219","Title":"CVE-2022-24800","CVE":"CVE-2022-24800","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24800","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}