Patch
CVE-2024-27622
with vRx
Fixing vulnerable targets
To fix this vulnerability, the best approach is to upgrade your CMSMS instances to use the latest and the greatest version, which at the time of this writing is 2.2.21.
It could be downloaded via the following link:
curl -s -LO https://s3.amazonaws.com/cmsms/downloads/15179/cmsms-2.2.21-install.zip
Fixes for containerized workloads
FROM php:7.4.9-apache-buster
ENV DEBIAN_FRONTEND noninteractive
WORKDIR /var/www/html
RUN apt-get update && \
apt-get -y install curl zip libzip-dev libgd-dev && \
docker-php-ext-configure zip && \
docker-php-ext-install -j$(nproc) gd opcache mysqli zip && \
apt-get -yq autoremove && \
apt-get clean && \
rm -rf /var/lib/{apt,dpkg,cache,log}
RUN curl -s -LO https://s3.amazonaws.com/cmsms/downloads/15179/cmsms-2.2.21-install.zip && \
unzip cmsms-2.2.19-install.zip && \
rm -r cmsms-2.2.19-install.zip && \
a2enmod rewrite && \
chown -R www-data:www-data .
EXPOSE 80
Shown above is a simple Dockerfile that would build you a patched container for CMS Made Simple.
All you need to do is adjust is according to your environment, and you should have the vulnerability patched in !
Read more
Read less
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
More than 600 customers trust vRx:




Solution
Remediate faster with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.