CVE-2017-1000223
- EPSS 0.26%
- Veröffentlicht 17.11.2017 05:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
A stored web content injection vulnerability (WCI, a.k.a XSS) is present in MODX Revolution CMS version 2.5.6 and earlier. An authenticated user with permissions to edit users can save malicious JavaScript as a User Group name and potentially take co...
CVE-2015-6588
- EPSS 0.2%
- Veröffentlicht 29.08.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Cross-site scripting (XSS) vulnerability in login-fsp.html in MODX Revolution before 1.9.1 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING.
CVE-2017-11744
- EPSS 0.22%
- Veröffentlicht 30.07.2017 15:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In MODX Revolution 2.5.7, the "key" and "name" parameters in the System Settings module are vulnerable to XSS. A malicious payload sent to connectors/index.php will be triggered by every user, when they visit this module.
- EPSS 0.04%
- Veröffentlicht 18.05.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.
CVE-2017-9071
- EPSS 0.3%
- Veröffentlicht 18.05.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.
CVE-2017-9070
- EPSS 0.22%
- Veröffentlicht 18.05.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In MODX Revolution before 2.5.7, a user with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to connectors/index.php.
CVE-2017-9069
- EPSS 1.03%
- Veröffentlicht 18.05.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In MODX Revolution before 2.5.7, a user with file upload permissions is able to execute arbitrary code by uploading a file with the name .htaccess.
CVE-2017-9068
- EPSS 0.24%
- Veröffentlicht 18.05.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In MODX Revolution before 2.5.7, an attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter.
CVE-2017-8115
- EPSS 0.14%
- Veröffentlicht 25.04.2017 19:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Directory traversal in setup/processors/url_search.php (aka the search page of an unused processor) in MODX Revolution 2.5.7 might allow remote attackers to obtain system directory information.
CVE-2017-7324
- EPSS 2.18%
- Veröffentlicht 30.03.2017 07:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
setup/templates/findcore.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the core_path parameter.