CVE-2022-24800
PHP vulnerability analysis and mitigation

Overview

CVE-2022-24800 affects October/System, the system module for October CMS, a self-hosted CMS platform based on the Laravel PHP Framework. The vulnerability was discovered in versions prior to 1.0.476, 1.1.12, and 2.2.15, where an unauthenticated user could perform remote code execution (RCE) by exploiting a race condition in the temporary storage directory when developers allow users to specify their own filename in the fromData method. Notably, this vulnerability only affects plugins that expose the October\Rain\Database\Attach\File::fromData as a public interface and does not impact vanilla installations of October CMS (GitHub Advisory).

Technical details

The vulnerability stems from a race condition in the temporary storage directory when processing file uploads through the fromData method. The issue received a CVSS v3.1 Base Score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability is classified under CWE-362 (Concurrent Execution using Shared Resource with Improper Synchronization) (NVD).

Impact

When successfully exploited, the vulnerability allows unauthenticated attackers to execute remote code on the affected system. This could potentially lead to complete system compromise, as the vulnerability provides high levels of impact on confidentiality, integrity, and availability of the system (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in Build 476 (v1.0.476), v1.1.12, and v2.2.15. For users unable to upgrade, a manual workaround is available by applying the patch from octobercms/library@fe569f3 to their installation. The fix involves modifying the file handling process to use unique temporary filenames during the upload process (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-21857HIGH8.3
  • PHPPHP
  • redaxo/source
NoYesJan 07, 2026
CVE-2025-68954HIGH7.5
  • PHPPHP
  • github.com/pterodactyl/wings
NoYesJan 06, 2026
CVE-2025-68456HIGH7
  • PHPPHP
  • cpe:2.3:a:craftcms:craft_cms
NoYesJan 05, 2026
CVE-2025-69197MEDIUM6.5
  • PHPPHP
  • pterodactyl/panel
NoYesJan 06, 2026
CVE-2026-22242MEDIUM4.9
  • PHPPHP
  • coreshop/core-shop
NoYesJan 07, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management