Azuriom CMS Template Injection

HIGH (8.8)

Threat Intelligence

⚠️ CRITICAL GAP - Exploits exist but no detection available
EPSS Score: 0.05% chance of exploitation (percentile: 16%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: GitHub PoC

How we test →

What is it?

Azuriom is an enterprise content management system used by some organizations for managing digital assets. This vulnerability allows attackers to inject arbitrary code into the CMS's template engine, potentially leading to privilege escalation and unauthorized access to sensitive data.

Am I affected?

You're affected if you use Client-side template. Specific version info not stated in the advisory. If you don't recognise this software, you're probably not affected.

How to fix

Upgrade to Azuriom 1.2.8 or later: https://github.com/Azuriom/Azuriom/releases/tag/1.2.8
- Immediate mitigations:
- Restrict network access to your Azuriom instance (firewall it from the public internet)
- Audit admin account activity for suspicious access patterns
- Monitor for unauthorized template modifications