ImpressCMS 1.4.4 contains a file upload vulnerability with weak extension sanitization that allows attackers to upload potentially malicious files. Attackers can bypass file upload restrictions by using alternative file extensions .php2.php6.php7.phps.pht to execute arbitrary PHP code on the server.
References
| Link | Resource |
|---|---|
| https://github.com/ImpressCMS/impresscms | Product |
| https://www.exploit-db.com/exploits/50890 | Exploit Third Party Advisory VDB Entry |
| https://www.impresscms.org/ | Product |
| https://www.vulncheck.com/advisories/impresscms-unrestricted-file-upload | Third Party Advisory |
Configurations
History
03 Feb 2026, 19:26
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Impresscms
Impresscms impresscms |
|
| CPE | cpe:2.3:a:impresscms:impresscms:1.4.4:*:*:*:*:*:*:* | |
| References | () https://github.com/ImpressCMS/impresscms - Product | |
| References | () https://www.exploit-db.com/exploits/50890 - Exploit, Third Party Advisory, VDB Entry | |
| References | () https://www.impresscms.org/ - Product | |
| References | () https://www.vulncheck.com/advisories/impresscms-unrestricted-file-upload - Third Party Advisory |
Information
Published : 2026-01-13 23:15
Updated : 2026-02-03 19:26
NVD link : CVE-2022-50912
Mitre link : CVE-2022-50912
CVE.ORG link : CVE-2022-50912
JSON object : View
Products Affected
impresscms
- impresscms
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
