Pluxml

Pluxml

24 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.04%
  • Veröffentlicht 10.03.2026 00:00:00
  • Zuletzt bearbeitet 07.04.2026 01:21:14

If the anti spam-captcha functionality in PluXml versions 5.8.22 and earlier is enabled, a captcha challenge is generated with a format that can be automatically recognized for articles, such that an automated script is able to solve this anti-spam m...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 10.03.2026 00:00:00
  • Zuletzt bearbeitet 07.04.2026 01:21:59

A Stored Cross-Site Scripting (XSS) vulnerability exists in the PluXml article comments feature for PluXml versions 5.8.22 and earlier. The application fails to properly sanitize or validate user-supplied input in the "link" field of a comment. An at...

  • EPSS 0.06%
  • Veröffentlicht 27.02.2026 11:35:27
  • Zuletzt bearbeitet 27.02.2026 18:36:00

PluXml CMS allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated se...

  • EPSS 0.03%
  • Veröffentlicht 27.02.2026 11:35:23
  • Zuletzt bearbeitet 27.02.2026 18:34:15

PluXml CMS is vulnerable to Stored XSS in Static Pages editing functionality. Attacker with editing privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. The vendor was notified early ab...

  • EPSS 0.03%
  • Veröffentlicht 27.02.2026 11:35:08
  • Zuletzt bearbeitet 27.02.2026 18:33:58

PluXml CMS is vulnerable to Stored XSS in file uploading functionality. An authenticated attacker can upload an SVG file containing a malicious payload, which will be executed when a victim clicks the link associated with the uploaded image. In versi...

Exploit
  • EPSS 0.07%
  • Veröffentlicht 02.01.2026 14:32:11
  • Zuletzt bearbeitet 27.02.2026 03:45:54

A vulnerability was determined in PluXml up to 5.8.22. Affected is the function FileCookieJar::__destruct of the file core/admin/medias.php of the component Media Management Module. Executing a manipulation of the argument File can lead to deserializ...

Exploit
  • EPSS 0.16%
  • Veröffentlicht 22.12.2025 00:00:00
  • Zuletzt bearbeitet 02.01.2026 16:58:24

Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).

  • EPSS 0.28%
  • Veröffentlicht 17.10.2025 00:00:00
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A remote code execution (RCE) vulnerability exists in the PluXml CMS theme editor, specifically in the minify.php file located under the default theme directory (/themes/defaut/css/minify.php). An authenticated administrator user can overwrite this f...

  • EPSS 2.88%
  • Veröffentlicht 29.10.2024 22:15:03
  • Zuletzt bearbeitet 15.04.2026 00:35:42

A remote code execution (RCE) vulnerability in the component /PluXml/core/admin/parametres_edittpl.php of PluXml v5.8.16 and lower allows attackers to execute arbitrary code via injecting a crafted payload into a template.

Exploit
  • EPSS 4.77%
  • Veröffentlicht 25.01.2024 21:15:09
  • Zuletzt bearbeitet 30.05.2025 15:15:32

PluXml Blog v5.8.9 was discovered to contain a remote code execution (RCE) vulnerability in the Static Pages feature. This vulnerability is exploited via injecting a crafted payload into the Content field.