Vulnerabilities (CVE)

Filtered by vendor Craftcms Subscribe
Filtered by product Craft Cms
Total 50 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-3814 1 Craftcms 1 Craft Cms 2024-11-21 6.5 MEDIUM 8.8 HIGH
Craft CMS 2.6.3000 allows remote attackers to execute arbitrary PHP code by using the "Assets->Upload files" screen and then the "Replace it" option, because this allows a .jpg file to have embedded PHP code, and then be renamed to a .php extension.
CVE-2017-9516 1 Craftcms 1 Craft Cms 2024-11-21 3.5 LOW 5.4 MEDIUM
Craft CMS before 2.6.2982 allows for a potential XSS attack vector by uploading a malicious SVG file.
CVE-2017-8385 1 Craftcms 1 Craft Cms 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Craft CMS before 2.6.2976 does not prevent modification of the URL in a forgot-password email message.
CVE-2017-8384 1 Craftcms 1 Craft Cms 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Craft CMS before 2.6.2976 allows XSS attacks because an array returned by HttpRequestService::getSegments() and getActionSegments() need not be zero-based. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-8052.
CVE-2017-8383 1 Craftcms 1 Craft Cms 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
Craft CMS before 2.6.2976 does not properly restrict viewing the contents of files in the craft/app/ folder.
CVE-2017-8052 1 Craftcms 1 Craft Cms 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Craft CMS before 2.6.2974 allows XSS attacks.
CVE-2024-52292 1 Craftcms 1 Craft Cms 2024-11-19 N/A 6.5 MEDIUM
Craft is a content management system (CMS). The dataUrl function can be exploited if an attacker has write permissions on system notification templates. This function accepts an absolute file path, reads the file's content, and converts it into a Base64-encoded string. By embedding this function within a system notification template, the attacker can exfiltrate the Base64-encoded file content through a triggered system email notification. Once the email is received, the Base64 payload can be decoded, allowing the attacker to read arbitrary files on the server. This is fixed in 5.4.9 and 4.12.8.
CVE-2024-52291 1 Craftcms 1 Craft Cms 2024-11-19 N/A 7.2 HIGH
Craft is a content management system (CMS). A vulnerability in CraftCMS allows an attacker to bypass local file system validation by utilizing a double file:// scheme (e.g., file://file:////). This enables the attacker to specify sensitive folders as the file system, leading to potential file overwriting through malicious uploads, unauthorized access to sensitive files, and, under certain conditions, remote code execution (RCE) via Server-Side Template Injection (SSTI) payloads. Note that this will only work if you have an authenticated administrator account with allowAdminChanges enabled. This is fixed in 5.4.6 and 4.12.5.
CVE-2024-52293 1 Craftcms 1 Craft Cms 2024-11-19 N/A 7.2 HIGH
Craft is a content management system (CMS). Prior to 4.12.2 and 5.4.3, Craft is missing normalizePath in the function FileHelper::absolutePath could lead to Remote Code Execution on the server via twig SSTI. This is a sequel to CVE-2023-40035. This vulnerability is fixed in 4.12.2 and 5.4.3.
CVE-2024-45406 1 Craftcms 1 Craft Cms 2024-09-13 N/A 4.8 MEDIUM
Craft is a content management system (CMS). Craft CMS 5 stored XSS can be triggered by the breadcrumb list and title fields with user input.
CVE-2024-41800 1 Craftcms 1 Craft Cms 2024-08-26 N/A 7.5 HIGH
Craft is a content management system (CMS). Craft CMS 5 allows reuse of TOTP tokens multiple times within the validity period. An attacker is able to re-submit a valid TOTP token to establish an authenticated session. This requires that the attacker has knowledge of the victim's credentials. This has been patched in Craft 5.2.3.
CVE-2023-36260 1 Craftcms 1 Craft Cms 2024-08-02 N/A 7.5 HIGH
An issue was discovered in the Feed Me plugin 4.6.1 for Craft CMS. It allows remote attackers to cause a denial of service (DoS) via crafted strings to Feed-Me Name and Feed-Me URL fields, due to saving a feed using an Asset element type with no volume selected. NOTE: this is not a report about code provided by the Craft CMS product; it is only a report about the Feed Me plugin. NOTE: a third-party report states that commit b5d6ede51848349bd91bc95fec288b6793f15e28 has "nothing to do with security."
CVE-2023-30179 1 Craftcms 1 Craft Cms 2024-08-02 N/A 7.2 HIGH
CraftCMS version 3.7.59 is vulnerable to Server-Side Template Injection (SSTI). An authenticated attacker can inject Twig Template to User Photo Location field when setting User Photo Location in User Settings, lead to Remote Code Execution. NOTE: the vendor disputes this because only Administrators can add this Twig code, and (by design) Administrators are allowed to do that by default.
CVE-2024-37843 1 Craftcms 1 Craft Cms 2024-08-01 N/A 9.8 CRITICAL
Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint.
CVE-2022-37783 1 Craftcms 1 Craft Cms 2024-06-10 N/A 7.5 HIGH
All Craft CMS versions between 3.0.0 and 3.7.32 disclose password hashes of users who authenticate using their E-Mail address or username in Anti-CSRF-Tokens. Craft CMS uses a cookie called CRAFT_CSRF_TOKEN and a HTML hidden field called CRAFT_CSRF_TOKEN to avoid Cross Site Request Forgery attacks. The CRAFT_CSRF_TOKEN cookie discloses the password hash in without encoding it whereas the corresponding HTML hidden field discloses the users' password hash in a masked manner, which can be decoded by using public functions of the YII framework.
CVE-2024-21622 1 Craftcms 1 Craft Cms 2024-02-28 N/A 8.8 HIGH
Craft is a content management system. This is a potential moderate impact, low complexity privilege escalation vulnerability in Craft starting in 3.x prior to 3.9.6 and 4.x prior to 4.4.16 with certain user permissions setups. This has been fixed in Craft 4.4.16 and Craft 3.9.6. Users should ensure they are running at least those versions.
CVE-2023-36259 1 Craftcms 1 Craft Cms 2024-02-28 N/A 5.4 MEDIUM
Cross Site Scripting (XSS) vulnerability in Craft CMS Audit Plugin before version 3.0.2 allows attackers to execute arbitrary code during user creation.
CVE-2023-40035 1 Craftcms 1 Craft Cms 2024-02-28 N/A 7.2 HIGH
Craft is a CMS for creating custom digital experiences on the web and beyond. Bypassing the validatePath function can lead to potential remote code execution. This vulnerability can lead to malicious control of vulnerable systems and data exfiltrations. Although the vulnerability is exploitable only in the authenticated users, configuration with ALLOW_ADMIN_CHANGES=true, there is still a potential security threat (Remote Code Execution). This issue has been patched in version 4.4.15 and version 3.8.15.
CVE-2023-41892 1 Craftcms 1 Craft Cms 2024-02-28 N/A 9.8 CRITICAL
Craft CMS is a platform for creating digital experiences. This is a high-impact, low-complexity attack vector. Users running Craft installations before 4.4.15 are encouraged to update to at least that version to mitigate the issue. This issue has been fixed in Craft CMS 4.4.15.
CVE-2023-30177 1 Craftcms 1 Craft Cms 2024-02-28 N/A 6.1 MEDIUM
CraftCMS 3.7.59 is vulnerable Cross Site Scripting (XSS). An attacker can inject javascript code into Volume Name.