An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution.
Use Dotcms vendor hub and Dotcms product page to widen CVE-2022-26352 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-11165, CVE-2022-45782 and CVE-2022-45783 for nearby disclosures in the same product family.