Aero CMS 0.0.1 Vulnerability Allows Authenticated PHP Code Injection
The National Vulnerability Database has detailed CVE-2022-50944, a critical PHP code injection vulnerability within Aero CMS version 0.0.1. This flaw enables authenticated attackers to execute arbitrary PHP code by uploading malicious files. The attack vector is straightforward: an attacker can upload PHP files with embedded code via the image parameter to the admin/posts.php endpoint, specifically with the source=add_post parameter. The server then executes these uploaded files.
This isn’t theoretical. An authenticated attacker gaining this foothold can completely compromise the underlying server. We’re talking about full system access, data exfiltration, or even using the compromised CMS as a pivot point for further network penetration. The CVSS score of 8.8 (HIGH) reflects the severe impact: network access, low complexity, low privileges required, and complete confidentiality, integrity, and availability compromise.
For defenders, the takeaway is clear. If Aero CMS 0.0.1 is in your environment, it’s a ticking time bomb. This isn’t a complex exploit; it leverages a fundamental flaw in how the application handles file uploads. Prioritize patching or, failing that, immediate removal. Assume compromise if you’re running this version unpatched and have any authenticated users.
What This Means For You
- If your organization uses Aero CMS 0.0.1, you have a critical vulnerability that allows authenticated attackers to execute arbitrary PHP code. Immediately identify all instances of this CMS, apply any available patches, or, if no patch exists, remove it from your environment. Audit logs for suspicious file uploads or unexpected server activity originating from the CMS.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2022-50944 - Aero CMS Authenticated PHP Code Injection via Image Upload
title: CVE-2022-50944 - Aero CMS Authenticated PHP Code Injection via Image Upload
id: scw-2026-05-10-ai-1
status: experimental
level: critical
description: |
Detects the specific exploit path and parameters used in CVE-2022-50944. Attackers authenticated to Aero CMS 0.0.1 can upload a malicious PHP file disguised as an image via the 'image' parameter to the '/admin/posts.php' endpoint with 'source=add_post'. This rule looks for POST requests to this specific path, expecting a 200 status code, and identifies the upload of a file with a .php extension.
author: SCW Feed Engine (AI-generated)
date: 2026-05-10
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2022-50944/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
uri|contains:
- '/admin/posts.php?source=add_post'
cs-method:
- 'POST'
sc-status:
- '200'
cs-uri-query|contains:
- 'image='
selection_image_upload:
TargetFilename|endswith:
- '.php'
condition: selection AND selection_image_upload
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2022-50944 | Code Injection | Aero CMS 0.0.1 |
| CVE-2022-50944 | Code Injection | PHP code injection via image parameter |
| CVE-2022-50944 | RCE | Authenticated arbitrary PHP code execution |
| CVE-2022-50944 | Code Injection | Vulnerable endpoint: admin/posts.php with source=add_post parameter |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 10, 2026 at 16:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.