Filtered by vendor Modx
Subscribe
Total
44 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-8773 | 1 Modx | 1 Modx Revolution | 2025-04-12 | 6.8 MEDIUM | N/A |
MODX Revolution 2.x before 2.2.15 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism by (1) omitting the CSRF token or via a (2) long string in the CSRF token parameter. | |||||
CVE-2014-8775 | 1 Modx | 1 Modx Revolution | 2025-04-12 | 5.0 MEDIUM | N/A |
MODX Revolution 2.x before 2.2.15 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. | |||||
CVE-2014-2311 | 1 Modx | 1 Modx Revolution | 2025-04-12 | 7.5 HIGH | N/A |
SQL injection vulnerability in modx.class.php in MODX Revolution 2.0.0 before 2.2.13 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | |||||
CVE-2014-5451 | 1 Modx | 1 Modx Revolution | 2025-04-12 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in manager/templates/default/header.tpl in MODX Revolution 2.3.1-pl and earlier allows remote attackers to inject arbitrary web script or HTML via the "a" parameter to manager/. NOTE: this issue exists because of a CVE-2014-2080 regression. | |||||
CVE-2016-10038 | 1 Modx | 1 Modx Revolution | 2025-04-12 | 7.5 HIGH | 7.3 HIGH |
Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/remove. | |||||
CVE-2014-8992 | 1 Modx | 1 Modx Revolution | 2025-04-12 | 4.3 MEDIUM | N/A |
Cross-site scripting (XSS) vulnerability in manager/assets/fileapi/FileAPI.flash.image.swf in MODX Revolution 2.3.2-pl allows remote attackers to inject arbitrary web script or HTML via the callback parameter. | |||||
CVE-2010-4883 | 1 Modx | 1 Revolution | 2025-04-11 | 2.6 LOW | N/A |
Cross-site scripting (XSS) vulnerability in manager/index.php in MODx Revolution 2.0.2-pl allows remote attackers to inject arbitrary web script or HTML via the modhash parameter. | |||||
CVE-2010-5278 | 1 Modx | 1 Modx Revolution | 2025-04-11 | 4.3 MEDIUM | N/A |
Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. NOTE: some of these details are obtained from third party information. | |||||
CVE-2025-28010 | 1 Modx | 1 Modx | 2025-04-03 | N/A | 5.4 MEDIUM |
A cross-site scripting (XSS) vulnerability has been identified in MODX prior to 3.1.0. The vulnerability allows authenticated users to upload SVG files containing malicious JavaScript code as profile images, which gets executed in victims' browsers when viewing the profile image. | |||||
CVE-2022-26149 | 1 Modx | 1 Revolution | 2024-11-21 | 6.5 MEDIUM | 7.2 HIGH |
MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator. | |||||
CVE-2020-25911 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 6.4 MEDIUM | 9.1 CRITICAL |
A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS). | |||||
CVE-2019-14518 | 1 Modx | 1 Evolution Cms | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Evolution CMS 2.0.x allows XSS via a description and new category location in a template. NOTE: the vendor states that the behavior is consistent with the "access policy in the administration panel. | |||||
CVE-2019-1010178 | 1 Modx | 1 Fred | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
Fred MODX Revolution < 1.0.0-beta5 is affected by: Incorrect Access Control - CWE-648. The impact is: Remote Code Execution. The component is: assets/components/fred/web/elfinder/connector.php. The attack vector is: Uploading a PHP file or change data in the database. The fixed version is: https://github.com/modxcms/fred/commit/139cefac83b2ead90da23187d92739dec79d3ccd and https://github.com/modxcms/fred/commit/01f0a3d1ae7f3970639c2a0db1887beba0065246. | |||||
CVE-2019-1010123 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
MODX Revolution Gallery 1.7.0 is affected by: CWE-434: Unrestricted Upload of File with Dangerous Type. The impact is: Creating file with custom a filename and content. The component is: Filtering user parameters before passing them into phpthumb class. The attack vector is: web request via /assets/components/gallery/connector.php. | |||||
CVE-2018-20758 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
MODX Revolution through v2.7.0-pl allows XSS via User Settings such as Description. | |||||
CVE-2018-20757 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
MODX Revolution through v2.7.0-pl allows XSS via an extended user field such as Container name or Attribute name. | |||||
CVE-2018-20756 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
MODX Revolution through v2.7.0-pl allows XSS via a document resource (such as pagetitle), which is mishandled during an Update action, a Quick Edit action, or the viewing of manager logs. | |||||
CVE-2018-20755 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
MODX Revolution through v2.7.0-pl allows XSS via the User Photo field. | |||||
CVE-2018-17556 | 1 Modx | 1 Modx Revolution | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
MODX Revolution v2.6.5-pl allows stored XSS via a Create New Media Source action. | |||||
CVE-2018-16638 | 1 Modx | 1 Evolution Cms | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
Evolution CMS 1.4.x allows XSS via the manager/ search parameter. |