e107 CMS version 3.2.1 contains a critical file upload vulnerability that allows authenticated administrators to override arbitrary server files through path traversal. The vulnerability exists in the Media Manager's remote URL upload functionality (image.php) where the upload_caption parameter is not properly sanitized. An attacker with administrative privileges can use directory traversal sequences (../../../) in the upload_caption field to overwrite critical system files outside the intended upload directory. This can lead to complete compromise of the web application by overwriting configuration files, executable scripts, or other critical system components. The vulnerability was discovered by Hubert Wojciechowski and affects the image.php component in the admin interface.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 21 Jan 2026 03:15:00 +0900

Type Values Removed Values Added
CPEs cpe:2.3:a:e107:e107:3.2.1:*:*:*:*:*:*:*

Thu, 15 Jan 2026 05:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 20:15:00 +0900

Type Values Removed Values Added
First Time appeared E107
E107 e107
E107 e107 Cms
Vendors & Products E107
E107 e107
E107 e107 Cms

Wed, 14 Jan 2026 08:00:00 +0900

Type Values Removed Values Added
Description e107 CMS version 3.2.1 contains a critical file upload vulnerability that allows authenticated administrators to override arbitrary server files through path traversal. The vulnerability exists in the Media Manager's remote URL upload functionality (image.php) where the upload_caption parameter is not properly sanitized. An attacker with administrative privileges can use directory traversal sequences (../../../) in the upload_caption field to overwrite critical system files outside the intended upload directory. This can lead to complete compromise of the web application by overwriting configuration files, executable scripts, or other critical system components. The vulnerability was discovered by Hubert Wojciechowski and affects the image.php component in the admin interface.
Title e107 CMS v3.2.1 - Upload Restriction Bypass with Path Traversal File Override
Weaknesses CWE-22
CWE-434
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-14T19:18:51.220Z

Reserved: 2026-01-11T13:34:26.330Z

Link: CVE-2022-50939

cve-icon Vulnrichment

Updated: 2026-01-14T15:48:21.643Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-13T23:15:59.233

Modified: 2026-01-20T18:03:06.060

Link: CVE-2022-50939

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-14T19:49:09Z

Weaknesses