Security for everyone

CVE-2022-26352 Scanner

Detects 'Unrestricted File Upload' vulnerability in dotCMS affects v. 3.0 through 22.02.


Short Info




Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4

Parent Category

CVE-2022-26352 Scanner Detail

DotCMS is a popular content management system used for creating and managing websites, intranets, and other digital assets. It allows organizations to efficiently publish and update content across various platforms, including web, mobile, and social media. DotCMS provides a wide range of functionalities, including content authoring, workflow management, personalization, and integration with third-party systems.

One of the recent vulnerabilities detected in dotCMS is CVE-2022-26352. This vulnerability allows attackers to exploit a flaw in the ContentResource API, which processes multipart form requests to upload files. The issue arises when the API fails to sanitize the file names, allowing attackers to use directory traversal techniques to save files outside the intended storage location. If anonymous content creation is enabled, unauthenticated attackers can upload malicious files, such as .jsp files, that can result in remote code execution.

The exploitation of CVE-2022-26352 can lead to severe consequences for organizations using dotCMS. Attackers can gain unauthorized access to systems, steal sensitive information, or launch DDoS attacks. They can also take advantage of the compromised systems to distribute malware or launch attacks on other systems. Organizations may face reputational damage, legal liabilities, or financial loss due to the impact of such cyberattacks.

Thanks to the pro features of the platform, those who read this article can easily and quickly learn about vulnerabilities in their digital assets. With threat intelligence, vulnerability scanning, and risk monitoring capabilities, can help organizations stay ahead of cyber threats and protect their systems, data, and customers.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture