Dotcms

Dotcms

58 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 24.02.2026 08:27:07
  • Zuletzt bearbeitet 03.03.2026 00:34:31

A sandbox escape vulnerability exists in dotCMS’s Velocity scripting engine (VTools) that allows authenticated users with scripting privileges to bypass class and package restrictions enforced by SecureUberspectorImpl. By dynamically modifying the V...

  • EPSS 1.49%
  • Veröffentlicht 04.09.2025 14:12:42
  • Zuletzt bearbeitet 11.09.2025 15:15:38

dotCMS versions 24.03.22 and after, identified a Boolean-based blind SQLi vulnerability in the /api/v1/contenttype endpoint. This endpoint uses the sites query parameter, which accepts a comma-separated list of site identifiers or keys. The vulnerab...

  • EPSS 0.7%
  • Veröffentlicht 25.07.2024 22:15:08
  • Zuletzt bearbeitet 21.11.2024 09:30:44

The "reset password" login page accepted an HTML injection via URL parameters. This has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a http://local...

  • EPSS 0.16%
  • Veröffentlicht 01.04.2024 22:15:23
  • Zuletzt bearbeitet 27.06.2025 14:06:33

System->Maintenance-> Log Files in dotCMS dashboard is providing the username/password for database connections in the log output. Nevertheless, this is a moderate issue as it requires a backend admin as well as that dbs are locked down by environmen...

  • EPSS 0.22%
  • Veröffentlicht 01.04.2024 22:15:22
  • Zuletzt bearbeitet 27.06.2025 14:06:30

In dotCMS dashboard, the Tools and Log Files tabs under System → Maintenance Portlet, which is and always has been an Admin portlet, is accessible to anyone with that portlet and not just to CMS Admins. Users that get site admin but not a system admi...

  • EPSS 0.18%
  • Veröffentlicht 17.10.2023 23:15:11
  • Zuletzt bearbeitet 21.11.2024 08:16:18

In dotCMS, versions mentioned, a flaw in the NormalizationFilter does not strip double slashes (//) from URLs, potentially enabling bypasses for XSS and access controls. An example affected URL is https://demo.dotcms.com//html/portlet/ext/files/edit...

  • EPSS 0.38%
  • Veröffentlicht 01.02.2023 23:15:09
  • Zuletzt bearbeitet 27.03.2025 17:15:37

In dotCMS 5.x-22.06, it is possible to call the TempResource multiple times, each time requesting the dotCMS server to download a large file. If done repeatedly, this will result in Tomcat request-thread exhaustion and ultimately a denial of any othe...

  • EPSS 2.75%
  • Veröffentlicht 01.02.2023 22:15:08
  • Zuletzt bearbeitet 27.03.2025 17:15:38

An issue was discovered in dotCMS core 4.x through 22.10.2. An authenticated directory traversal vulnerability in the dotCMS API can lead to Remote Code Execution.

  • EPSS 0.37%
  • Veröffentlicht 01.02.2023 22:15:08
  • Zuletzt bearbeitet 27.03.2025 17:15:37

An issue was discovered in dotCMS core 5.3.8.5 through 5.3.8.15 and 21.03 through 22.10.1. A cryptographically insecure random generation algorithm for password-reset token generation leads to account takeover.

  • EPSS 0.27%
  • Veröffentlicht 01.02.2023 22:15:08
  • Zuletzt bearbeitet 27.03.2025 17:15:37

In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects t...