{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T17:52:25.182","vulnerabilities":[{"cve":{"id":"CVE-2022-39298","sourceIdentifier":"security-advisories@github.com","published":"2022-10-12T23:15:09.707","lastModified":"2024-11-21T07:17:59.003","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MelisFront is the engine that displays website hosted on Melis Platform. It deals with showing pages, plugins, URL rewritting, search optimization and SEO, etc. Attackers can deserialize arbitrary data on affected versions of `melisplatform/melis-front`, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to `melisplatform/melis-front` >= 5.0.1. This issue was addressed by restricting allowed classes when deserializing user-controlled data."},{"lang":"es","value":"MelisFront es el motor que muestra las páginas web alojadas en la Plataforma Melis. Es encargada de mostrar las páginas, los plugins, la reescritura de URL, la optimización de las búsquedas y el SEO, etc. Los atacantes pueden deserializar datos arbitrarios en las versiones afectadas de \"melisplatform/melis-front\", y en última instancia conlleva a una ejecución de código PHP arbitrario en el sistema. La realización de este ataque no requiere autenticación. Los usuarios deben actualizar inmediatamente a \"melisplatform/melis-front\" versiones posteriores a 5.0.1 incluyéndola. Este problema ha sido abordado al restringir las clases permitidas cuando son deserializados los datos controlados por el usuario"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":5.5},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:melistechnology:meliscms:*:*:*:*:*:*:*:*","versionEndExcluding":"5.0.1","matchCriteriaId":"2A0F2482-77FC-4B8D-A360-E340941ACA59"}]}]}],"references":[{"url":"https://github.com/melisplatform/melis-front/commit/89ae612d5f1f7aa2fb621ee8de27dffe1feb851e","source":"security-advisories@github.com","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/melisplatform/melis-front/security/advisories/GHSA-h479-2mv4-5c26","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/melisplatform/melis-front/commit/89ae612d5f1f7aa2fb621ee8de27dffe1feb851e","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/melisplatform/melis-front/security/advisories/GHSA-h479-2mv4-5c26","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}