Vulnerabilities (CVE)

Filtered by vendor Craftcms Subscribe
Total 51 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-17496 1 Craftcms 1 Craft Cms 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Craft CMS before 3.3.8 has stored XSS via a name field. This field is mishandled during site deletion.
CVE-2019-15929 1 Craftcms 1 Craft Cms 2024-11-21 5.0 MEDIUM 9.8 CRITICAL
In Craft CMS through 3.1.7, the elevated session password prompt was not being rate limited like normal login forms, leading to the possibility of a brute force attempt on them.
CVE-2019-14280 1 Craftcms 1 Craft Cms 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
In some circumstances, Craft 2 before 2.7.10 and 3 before 3.2.6 wasn't stripping EXIF data from user-uploaded images when it was configured to do so, potentially exposing personal/geolocation data to the public.
CVE-2019-12823 1 Craftcms 1 Craft Cms 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Craft CMS before 3.1.31 does not properly filter XML feeds and thus allowing XSS.
CVE-2018-3814 1 Craftcms 1 Craft Cms 2024-11-21 6.5 MEDIUM 8.8 HIGH
Craft CMS 2.6.3000 allows remote attackers to execute arbitrary PHP code by using the "Assets->Upload files" screen and then the "Replace it" option, because this allows a .jpg file to have embedded PHP code, and then be renamed to a .php extension.
CVE-2018-20465 1 Craftcms 1 Craft Cms 2024-11-21 4.0 MEDIUM 7.2 HIGH
Craft CMS through 3.0.34 allows remote authenticated administrators to read sensitive information via server-side template injection, as demonstrated by a {% string for craft.app.config.DB.user and craft.app.config.DB.password in the URI Format of the Site Settings, which causes a cleartext username and password to be displayed in a URI field.
CVE-2018-20418 1 Craftcms 1 Craft Cms 2024-11-21 3.5 LOW 4.8 MEDIUM
index.php?p=admin/actions/entries/save-entry in Craft CMS 3.0.25 allows XSS by saving a new title from the console tab.
CVE-2024-52292 1 Craftcms 1 Craft Cms 2024-11-19 N/A 7.7 HIGH
Craft is a content management system (CMS). The dataUrl function can be exploited if an attacker has write permissions on system notification templates. This function accepts an absolute file path, reads the file's content, and converts it into a Base64-encoded string. By embedding this function within a system notification template, the attacker can exfiltrate the Base64-encoded file content through a triggered system email notification. Once the email is received, the Base64 payload can be decoded, allowing the attacker to read arbitrary files on the server. This is fixed in 5.4.9 and 4.12.8.
CVE-2024-52291 1 Craftcms 1 Craft Cms 2024-11-19 N/A 8.4 HIGH
Craft is a content management system (CMS). A vulnerability in CraftCMS allows an attacker to bypass local file system validation by utilizing a double file:// scheme (e.g., file://file:////). This enables the attacker to specify sensitive folders as the file system, leading to potential file overwriting through malicious uploads, unauthorized access to sensitive files, and, under certain conditions, remote code execution (RCE) via Server-Side Template Injection (SSTI) payloads. Note that this will only work if you have an authenticated administrator account with allowAdminChanges enabled. This is fixed in 5.4.6 and 4.12.5.
CVE-2024-52293 1 Craftcms 1 Craft Cms 2024-11-19 N/A 7.2 HIGH
Craft is a content management system (CMS). Prior to 4.12.2 and 5.4.3, Craft is missing normalizePath in the function FileHelper::absolutePath could lead to Remote Code Execution on the server via twig SSTI. This is a sequel to CVE-2023-40035. This vulnerability is fixed in 4.12.2 and 5.4.3.
CVE-2024-45406 1 Craftcms 1 Craft Cms 2024-09-13 N/A 5.5 MEDIUM
Craft is a content management system (CMS). Craft CMS 5 stored XSS can be triggered by the breadcrumb list and title fields with user input.