CVE-2022-25369
CRITICALCVSS v3
9.8
CRITICAL
EPSS Score
80.1%
exploit probability
CISA KEV
No
known exploited
Exploitation
—
SSVC status
Description
An issue was discovered in Dynamicweb before 9.12.8. An attacker can add a new administrator user without authentication. This flaw exists due to a logic issue when determining if the setup phases of the product can be run again. Once an attacker is authenticated as the new admin user they have added, it is possible to upload an executable file and achieve command execution. This is fixed in 9.5.9, 9.6.16, 9.7.8, 9.8.11, 9.9.8, 9.10.18, 9.12.8, and 9.13.0 (and later).
Technical Details
- CVSS v3 Vector
- 3.1
- Published
- 1/23/2026
- Last Modified
- 4/14/2026
Frequently Asked Questions
What is CVE-2022-25369?
An issue was discovered in Dynamicweb before 9.12.8. An attacker can add a new administrator user without authentication. This flaw exists due to a logic issue when determining if the setup phases of the product can be run again. Once an attacker is authenticated as the new admin user they have added, it is possible to upload an executable file and achieve command execution. This is fixed in 9.5.9, 9.6.16, 9.7.8, 9.8.11, 9.9.8, 9.10.18, 9.12.8, and 9.13.0 (and later).
Is CVE-2022-25369 actively exploited?
Active exploitation of CVE-2022-25369 has not been confirmed. The EPSS score is 80.1%, indicating the estimated probability of exploitation in the next 30 days.
What is the CVSS score for CVE-2022-25369?
CVE-2022-25369 has a CVSS v3 base score of 9.8 (CRITICAL severity), with vector string 3.1.
Is CVE-2022-25369 affecting your environment?
Use isMalicious to check if any of your IPs or domains are associated with this vulnerability's IOCs.