Wolfcms

Wolf Cms

16 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.22%
  • Published 13.03.2018 15:29:01
  • Last modified 21.11.2024 03:39:36

WolfCMS version version 0.8.3.1 contains a Reflected Cross Site Scripting vulnerability in "Create New File" and "Create New Directory" input box from 'files' Tab that can result in Session Hijacking, Spread Worms,Control the browser remotely. . This...

Exploit
  • EPSS 0.29%
  • Published 22.02.2018 19:29:04
  • Last modified 21.11.2024 04:11:22

Cross-site scripting (XSS) vulnerability in Wolf CMS 0.8.3.1 via the page editing feature, as demonstrated by /?/admin/page/edit/3.

Exploit
  • EPSS 1.35%
  • Published 08.09.2017 10:29:00
  • Last modified 20.04.2025 01:37:25

Wolf CMS 0.8.3.1 allows Cross-Site Scripting (XSS) attacks. The vulnerability exists due to insufficient sanitization of the file name in a "create-file-popup" action, and the directory name in a "create-directory-popup" action, in the HTTP POST meth...

Exploit
  • EPSS 11.86%
  • Published 14.04.2017 16:59:00
  • Last modified 20.04.2025 01:37:25

Wolf CMS before 0.8.3.1 allows unrestricted file upload and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not validate the parameter "filename" properly. Exploitation requires a registered user who has access...

Exploit
  • EPSS 11.86%
  • Published 14.04.2017 16:59:00
  • Last modified 20.04.2025 01:37:25

Wolf CMS before 0.8.3.1 allows unrestricted file rename and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not prevent a change of a file extension to ".php" after originally using the parameter "filename" for...

Exploit
  • EPSS 0.21%
  • Published 01.10.2012 20:55:03
  • Last modified 11.04.2025 00:51:21

Multiple cross-site request forgery (CSRF) vulnerabilities in Wolf CMS 0.75 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) delete users via the user id number to admin/user/delete; (2) delete p...