Vulnerabilities (CVE)

Filtered by vendor Monocms Subscribe
Filtered by product Monocms
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-10927 1 Monocms 1 Monocms 2024-11-22 4.0 MEDIUM 3.5 LOW
A vulnerability was found in MonoCMS up to 20240528. It has been classified as problematic. Affected is an unknown function of the file /monofiles/account.php of the component Account Information Page. The manipulation of the argument userid leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2024-10928 1 Monocms 1 Monocms 2024-11-22 4.0 MEDIUM 3.5 LOW
A vulnerability was found in MonoCMS up to 20240528. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /monofiles/opensaved.php of the component Posts Page. The manipulation of the argument filtcategory/filtstatus leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2020-28672 1 Monocms 1 Monocms 2024-11-21 9.0 HIGH 7.2 HIGH
MonoCMS Blog 1.0 is affected by incorrect access control that can lead to remote arbitrary code execution. At monofiles/category.php:27, user input can be saved to category/[foldername]/index.php causing RCE.
CVE-2020-25987 1 Monocms 1 Monocms 2024-11-21 5.0 MEDIUM 7.5 HIGH
MonoCMS Blog 1.0 stores hard-coded admin hashes in the log.xml file in the source files for MonoCMS Blog. Hash type is bcrypt and hashcat mode 3200 can be used to crack the hash.
CVE-2020-25986 1 Monocms 1 Monocms 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
A Cross Site Request Forgery (CSRF) vulnerability in MonoCMS Blog 1.0 allows attackers to change the password of a user.
CVE-2020-25985 1 Monocms 1 Monocms 2024-11-21 5.5 MEDIUM 8.1 HIGH
MonoCMS Blog 1.0 is affected by: Arbitrary File Deletion. Any authenticated user can delete files on and off the webserver (php files can be unlinked and not deleted).