Command Injection Vulnerability in Movable Type by Six Apart Ltd.
CVE-2022-38078
What is CVE-2022-38078?
The XMLRPC API of Movable Type, developed by Six Apart Ltd., is susceptible to a command injection vulnerability. An attacker can exploit this flaw by sending a specifically crafted POST request, potentially leading to the execution of arbitrary Perl scripts or arbitrary OS commands. This vulnerability affects multiple versions of the Movable Type platform, including versions prior to 7 r.5202, 6.8.6, and 1.52 for both Premium and Advanced offerings. Notably, it also impacts all versions from 4.0 onwards, including those that have reached End-of-Life.
Affected Version(s)
Movable Type XMLRPC API Movable Type 7 r.5202 and earlier, Movable Type Advanced 7 r.5202 and earlier, Movable Type 6.8.6 and earlier, Movable Type Advanced 6.8.6 and earlier, Movable Type Premium 1.52 and earlier, and Movable Type Premium Advanced 1.52 and earlier
References
EPSS Score
5% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
