Vulnerabilities (CVE)

Filtered by vendor Sulu Subscribe
Filtered by product Sulu
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-39343 1 Sulu 1 Sulu 2023-08-08 N/A 4.3 MEDIUM
Sulu is an open-source PHP content management system based on the Symfony framework. It allows over the Admin Login form to detect which user (username, email) exists and which one do not exist. Sulu Installation not using the old Symfony 5.4 security System and previous version are not impacted by this Security issue. The vulnerability has been patched in version 2.5.10.
CVE-2021-41169 1 Sulu 1 Sulu 2021-10-27 3.5 LOW 4.8 MEDIUM
Sulu is an open-source PHP content management system based on the Symfony framework. In versions before 1.6.43 are subject to stored cross site scripting attacks. HTML input into Tag names is not properly sanitized. Only admin users are allowed to create tags. Users are advised to upgrade.
CVE-2021-32737 1 Sulu 1 Sulu 2021-07-09 3.5 LOW 4.8 MEDIUM
Sulu is an open-source PHP content management system based on the Symfony framework. In versions of Sulu prior to 1.6.41, it is possible for a logged in admin user to add a script injection (cross-site-scripting) in the collection title. The problem is patched in version 1.6.41. As a workaround, one may manually patch the affected JavaScript files in lieu of updating.
CVE-2020-15132 1 Sulu 1 Sulu 2020-08-07 5.0 MEDIUM 5.3 MEDIUM
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that this user name does not exist. This enables attackers to retrieve valid usernames. Also, the response of the "Forgot Password" request returns the email address to which the email was sent, if the operation was successful. This information should not be exposed, as it can be used to gather email addresses. This problem was fixed in versions 1.6.35, 2.0.10 and 2.1.1.