CVE-2026-5344
- EPSS 0.02%
- Veröffentlicht 02.04.2026 14:45:09
- Zuletzt bearbeitet 03.04.2026 16:10:23
A security vulnerability has been detected in Textpattern up to 4.9.1. Affected by this vulnerability is the function mt_uploadImage of the file rpc/TXP_RPCServer.php of the component XML-RPC Handler. The manipulation of the argument file.name leads ...
CVE-2026-32986
- EPSS 0.03%
- Veröffentlicht 20.03.2026 15:42:04
- Zuletzt bearbeitet 16.04.2026 14:44:02
Textpattern CMS version 4.9.0 contains a second-order cross-site scripting vulnerability that allows attackers to inject malicious scripts by exploiting improper sanitization of user-supplied input in Atom feed XML elements. Attackers can embed unesc...
CVE-2023-53911
- EPSS 0.04%
- Veröffentlicht 17.12.2025 22:44:47
- Zuletzt bearbeitet 27.12.2025 17:15:43
Textpattern CMS 4.8.8 contains a stored cross-site scripting vulnerability in the article excerpt field that allows authenticated users to inject malicious scripts. Attackers can insert JavaScript payloads into the excerpt, which will execute when th...
CVE-2023-50038
- EPSS 0.07%
- Veröffentlicht 28.12.2023 07:15:08
- Zuletzt bearbeitet 21.11.2024 08:36:29
There is an arbitrary file upload vulnerability in the background of textpattern cms v4.8.8, which leads to the loss of server permissions.
CVE-2023-36220
- EPSS 2.04%
- Veröffentlicht 07.08.2023 14:15:11
- Zuletzt bearbeitet 21.11.2024 08:09:25
Directory Traversal vulnerability in Textpattern CMS v4.8.8 allows a remote authenticated attacker to execute arbitrary code and gain access to sensitive information via the plugin Upload function.
CVE-2023-24269
- EPSS 0.18%
- Veröffentlicht 28.04.2023 22:15:08
- Zuletzt bearbeitet 30.01.2025 21:15:09
An arbitrary file upload vulnerability in the plugin upload function of Textpattern v4.8.8 allows attackers to execute arbitrary code via a crafted Zip file.
CVE-2023-26852
- EPSS 7.26%
- Veröffentlicht 12.04.2023 17:15:07
- Zuletzt bearbeitet 10.02.2025 16:15:33
An arbitrary file upload vulnerability in the upload plugin of Textpattern v4.8.8 and below allows attackers to execute arbitrary code by uploading a crafted PHP file.
CVE-2021-40642
- EPSS 0.12%
- Veröffentlicht 29.06.2022 11:15:16
- Zuletzt bearbeitet 21.11.2024 06:24:29
Textpattern CMS v4.8.7 and older vulnerability exists through Sensitive Cookie in HTTPS Session Without 'Secure' Attribute via textpattern/lib/txplib_misc.php. The secure flag is not set for txp_login session cookie in the application. If the secure ...
CVE-2021-40658
- EPSS 0.24%
- Veröffentlicht 14.06.2022 11:15:10
- Zuletzt bearbeitet 21.11.2024 06:24:31
Textpattern 4.8.7 is affected by a HTML injection vulnerability through “Content>Write>Body”.
CVE-2021-44082
- EPSS 3.48%
- Veröffentlicht 29.03.2022 23:15:07
- Zuletzt bearbeitet 21.11.2024 06:30:20
textpattern 4.8.7 is vulnerable to Cross Site Scripting (XSS) via /textpattern/index.php,Body. A remote and unauthenticated attacker can use XSS to trigger remote code execution by uploading a webshell. To do so they must first steal the CSRF token b...