CVE-2022-39298
PHP vulnerability analysis and mitigation

Overview

A critical deserialization vulnerability (CVE-2022-39298) was discovered in MelisFront, the engine responsible for displaying websites hosted on Melis Platform. The vulnerability affects versions up to and including 5.0.0, with the issue existing since Melis 2.2.0 (approximately 5 years). The vulnerability was discovered during a security scan by the Sonar AppSec team and was patched in version 5.0.1 (Sonar Blog).

Technical details

The vulnerability exists in the MelisPluginRendererController where user-controlled data from POST requests is unsafely deserialized. The vulnerable code path starts with getRequest()->getPost()->toArray(), retrieves the 'pluginHardcodedConfig' parameter, and passes it through htmlentitydecode before calling PHP's unserialize() function without proper validation. This implementation allows for arbitrary PHP object deserialization, which can be exploited through carefully crafted popchains (Sonar Blog).

Impact

The vulnerability allows attackers to execute arbitrary PHP code on the affected system without requiring authentication. This could lead to complete system compromise through remote code execution. The attack vector is particularly severe as it can be exploited without any prior authentication (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in Melis Platform version 5.0.1 by adding the 'allowed_classes' => false parameter to the unserialize() function calls, which restricts deserialization to simple types like strings, arrays, and numbers. Users are strongly advised to upgrade to version 5.0.1 or later (GitHub Commit).

Additional resources


SourceThis report was generated using AI

Related PHP vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-65854CRITICAL9.8
  • PHPPHP
  • mineadmin/mineadmin
NoNoDec 12, 2025
CVE-2024-58303HIGH8.6
  • PHPPHP
  • fof/pretty-mail
NoNoDec 11, 2025
CVE-2025-67719HIGH8.5
  • PHPPHP
  • ibexa/user
NoYesDec 11, 2025
CVE-2025-67648HIGH7.1
  • PHPPHP
  • shopware/shopware
NoYesDec 11, 2025
CVE-2025-67737LOW3.1
  • PHPPHP
  • azuracast/azuracast
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management