Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2022-26159 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Ametys CMS auto-completion plugin leaks sensitive data.…

Q2Root Cause? (CWE/Flaw)

πŸ› οΈ **Root Cause**: Improper access control in the auto-completion plugin. πŸ” **Flaw**: The plugin exposes XML files (e.g., `domain/en.xml`) that store autocomplete history without authentication.…

Q3Who is affected? (Versions/Components)

🎯 **Affected**: Ametys CMS versions **before 4.5.0**. πŸ“¦ **Component**: The `auto-completion` plugin specifically. 🌐 **Scope**: Any instance running these older versions is vulnerable.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Read autocomplete XML files remotely. πŸ“‚ **Data Accessed**: All typed characters, including content from **private pages**.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. πŸšͺ **Auth**: None required (Remote Unauthenticated). βš™οΈ **Config**: Exploits the default behavior of the auto-completion plugin. 🎯 **Ease**: Simple HTTP request to specific paths.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exp**: **YES**. 🐍 **PoC**: Python script by `p0dalirius` dumps data to SQLite. πŸ§ͺ **Scanner**: Nuclei templates available for detection. 🌍 **Status**: Actively exploitable in the wild.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Request paths like `/plugins/web/service/search/auto-completion/domain/en.xml`. πŸ“‘ **Scan**: Use Nuclei templates (`CVE-2022-26159.yaml`). πŸ“Š **Verify**: Look for XML responses containing user input data.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ›‘οΈ **Fix**: Upgrade to **Ametys CMS 4.5.0** or later. πŸ“œ **Reference**: Issue CMS-10973 tracks the fix. βœ… **Official**: Patch is available for the vendor.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the auto-completion plugin if possible. 🚫 **Block**: Restrict access to `/plugins/web/service/search/auto-completion/` paths via WAF or firewall.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **HIGH**. πŸ“’ **Priority**: Critical due to unauthenticated access and sensitive data exposure (PII/Passwords). ⏳ **Action**: Patch immediately or apply strict network restrictions.