CVE-2025-70129
- EPSS 0.04%
- Veröffentlicht 10.03.2026 00:00:00
- Zuletzt bearbeitet 07.04.2026 01:21:14
If the anti spam-captcha functionality in PluXml versions 5.8.22 and earlier is enabled, a captcha challenge is generated with a format that can be automatically recognized for articles, such that an automated script is able to solve this anti-spam m...
CVE-2025-70128
- EPSS 0.03%
- Veröffentlicht 10.03.2026 00:00:00
- Zuletzt bearbeitet 07.04.2026 01:21:59
A Stored Cross-Site Scripting (XSS) vulnerability exists in the PluXml article comments feature for PluXml versions 5.8.22 and earlier. The application fails to properly sanitize or validate user-supplied input in the "link" field of a comment. An at...
CVE-2026-24352
- EPSS 0.06%
- Veröffentlicht 27.02.2026 11:35:27
- Zuletzt bearbeitet 27.02.2026 18:36:00
PluXml CMS allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated se...
CVE-2026-24351
- EPSS 0.03%
- Veröffentlicht 27.02.2026 11:35:23
- Zuletzt bearbeitet 27.02.2026 18:34:15
PluXml CMS is vulnerable to Stored XSS in Static Pages editing functionality. Attacker with editing privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. The vendor was notified early ab...
CVE-2026-24350
- EPSS 0.03%
- Veröffentlicht 27.02.2026 11:35:08
- Zuletzt bearbeitet 27.02.2026 18:33:58
PluXml CMS is vulnerable to Stored XSS in file uploading functionality. An authenticated attacker can upload an SVG file containing a malicious payload, which will be executed when a victim clicks the link associated with the uploaded image. In versi...
CVE-2025-15438
- EPSS 0.07%
- Veröffentlicht 02.01.2026 14:32:11
- Zuletzt bearbeitet 27.02.2026 03:45:54
A vulnerability was determined in PluXml up to 5.8.22. Affected is the function FileCookieJar::__destruct of the file core/admin/medias.php of the component Media Management Module. Executing a manipulation of the argument File can lead to deserializ...
CVE-2025-67436
- EPSS 0.16%
- Veröffentlicht 22.12.2025 00:00:00
- Zuletzt bearbeitet 02.01.2026 16:58:24
Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).
CVE-2025-57567
- EPSS 0.28%
- Veröffentlicht 17.10.2025 00:00:00
- Zuletzt bearbeitet 15.04.2026 00:35:42
A remote code execution (RCE) vulnerability exists in the PluXml CMS theme editor, specifically in the minify.php file located under the default theme directory (/themes/defaut/css/minify.php). An authenticated administrator user can overwrite this f...
CVE-2024-48138
- EPSS 2.88%
- Veröffentlicht 29.10.2024 22:15:03
- Zuletzt bearbeitet 15.04.2026 00:35:42
A remote code execution (RCE) vulnerability in the component /PluXml/core/admin/parametres_edittpl.php of PluXml v5.8.16 and lower allows attackers to execute arbitrary code via injecting a crafted payload into a template.
CVE-2024-22636
- EPSS 4.77%
- Veröffentlicht 25.01.2024 21:15:09
- Zuletzt bearbeitet 30.05.2025 15:15:32
PluXml Blog v5.8.9 was discovered to contain a remote code execution (RCE) vulnerability in the Static Pages feature. This vulnerability is exploited via injecting a crafted payload into the Content field.