Vulnerabilities (CVE)

Filtered by vendor Exponentcms Subscribe
Filtered by product Exponent Cms
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-23048 1 Exponentcms 1 Exponent Cms 2022-02-17 6.5 MEDIUM 7.2 HIGH
Exponent CMS 2.6.0patch2 allows an authenticated admin user to upload a malicious extension in the format of a ZIP file with a PHP file inside it. After upload it, the PHP file will be placed at "themes/simpletheme/{rce}.php" from where can be accessed in order to execute commands.
CVE-2017-18213 1 Exponentcms 1 Exponent Cms 2019-10-03 6.5 MEDIUM 7.2 HIGH
In Exponent CMS before 2.4.1 Patch #6, certain admin users can elevate their privileges.
CVE-2016-7452 1 Exponentcms 1 Exponent Cms 2018-02-27 5.0 MEDIUM 7.5 HIGH
The Pixidou Image Editor in Exponent CMS prior to v2.3.9 patch 2 could be used to upload a malicious file to any folder on the site via a cpi directory traversal.
CVE-2016-9282 1 Exponentcms 1 Exponent Cms 2017-07-28 5.0 MEDIUM 7.5 HIGH
SQL Injection in framework/modules/search/controllers/searchController.php in Exponent CMS v2.4.0 allows remote attackers to read database information via action=search&module=search with the search_string parameter.
CVE-2016-9283 1 Exponentcms 1 Exponent Cms 2017-07-28 5.0 MEDIUM 7.5 HIGH
SQL Injection in framework/core/subsystems/expRouter.php in Exponent CMS v2.4.0 allows remote attackers to read database information via address/addContentToSearch/id/ and a trailing string, related to a "sef URL" issue.
CVE-2016-9134 1 Exponentcms 1 Exponent Cms 2016-11-29 5.0 MEDIUM 7.5 HIGH
Exponent CMS 2.3.9 suffers from a SQL injection vulnerability in "/expPaginator.php" affecting the order parameter. Impact is Information Disclosure.
CVE-2016-9135 1 Exponentcms 1 Exponent Cms 2016-11-29 5.0 MEDIUM 7.5 HIGH
Exponent CMS 2.3.9 suffers from a SQL injection vulnerability in "/framework/modules/help/controllers/helpController.php" affecting the version parameter. Impact is Information Disclosure.
CVE-2016-9184 1 Exponentcms 1 Exponent Cms 2016-11-29 5.0 MEDIUM 7.5 HIGH
In /framework/modules/core/controllers/expHTMLEditorController.php of Exponent CMS 2.4.0, untrusted input is used to construct a table name, and in the selectObject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for SQL Injection. Impact is Information Disclosure.
CVE-2016-9182 1 Exponentcms 1 Exponent Cms 2016-11-29 5.0 MEDIUM 7.5 HIGH
Exponent CMS 2.4 uses PHP reflection to call a method of a controller class, and then uses the method name to check user permission. But, the method name in PHP reflection is case insensitive, and Exponent CMS permits undefined actions to execute by default, so an attacker can use a capitalized method name to bypass the permission check, e.g., controller=expHTMLEditor&action=preview&editor=ckeditor and controller=expHTMLEditor&action=Preview&editor=ckeditor. An anonymous user will be rejected for the former but can access the latter.
CVE-2016-9183 1 Exponentcms 1 Exponent Cms 2016-11-29 5.0 MEDIUM 7.5 HIGH
In /framework/modules/ecommerce/controllers/orderController.php of Exponent CMS 2.4.0, untrusted input is passed into selectObjectsBySql. The method selectObjectsBySql of class mysqli_database uses the injectProof method to prevent SQL injection, but this filter can be bypassed easily: it only sanitizes user input if there are odd numbers of ' or " characters. Impact is Information Disclosure.
CVE-2016-9242 1 Exponentcms 1 Exponent Cms 2016-11-29 6.5 MEDIUM 8.8 HIGH
Multiple SQL injection vulnerabilities in the update method in framework/modules/core/controllers/expRatingController.php in Exponent CMS 2.4.0 allow remote authenticated users to execute arbitrary SQL commands via the (1) content_type or (2) subtype parameter.