Vulnerabilities (CVE)

Filtered by vendor Soplanning Subscribe
Filtered by product Soplanning
Total 25 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-9571 1 Soplanning 1 Soplanning 2024-10-08 N/A 6.3 MEDIUM
Cross-Site Scripting (XSS) vulnerability in SOPlanning <1.45, due to lack of proper validation of user input via /soplanning/www/process/xajax_server.php, affecting multiple parameters. This could allow a remote user to send a specially crafted query to an authenticated user and partially take control of their browser session.
CVE-2024-27114 1 Soplanning 1 Soplanning 2024-09-19 N/A 9.8 CRITICAL
A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. If the public view setting is enabled, a attacker can upload a PHP-file that will be available for execution for a few milliseconds before it is removed, leading to execution of code on the underlying system. The vulnerability has been remediated in version 1.52.02.
CVE-2024-27115 1 Soplanning 1 Soplanning 2024-09-18 N/A 9.8 CRITICAL
A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. With this vulnerability, an attacker can upload executable files that are moved to a publicly accessible folder before verifying any requirements. This leads to the possibility of execution of code on the underlying system when the file is triggered. The vulnerability has been remediated in version 1.52.02.
CVE-2024-27113 1 Soplanning 1 Soplanning 2024-09-18 N/A 9.8 CRITICAL
An unauthenticated Insecure Direct Object Reference (IDOR) to the database has been found in the SO Planning tool that occurs when the public view setting is enabled. An attacker could use this vulnerability to gain access to the underlying database by exporting it as a CSV file. The vulnerability has been remediated in version 1.52.02.
CVE-2024-27112 1 Soplanning 1 Soplanning 2024-09-18 N/A 9.8 CRITICAL
A unauthenticated SQL Injection has been found in the SO Planning tool that occurs when the public view setting is enabled. An attacker could use this vulnerability to gain access to the underlying database. The vulnerability has been remediated in version 1.52.02.