Vulnerabilities (CVE)

Filtered by vendor Concrete5 Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-7725 1 Concrete5 1 Concrete5 2021-03-31 4.3 MEDIUM 6.1 MEDIUM
concrete5 8.1.0 places incorrect trust in the HTTP Host header during caching, if the administrator did not define a "canonical" URL on installation of concrete5 using the "Advanced Options" settings. Remote attackers can make a GET request with any domain name in the Host header; this is stored and allows for arbitrary domains to be set for certain links displayed to subsequent visitors, potentially an XSS vector.
CVE-2018-19146 1 Concrete5 1 Concrete5 2019-06-19 3.5 LOW 4.8 MEDIUM
Concrete5 8.4.3 has XSS because config/concrete.php allows uploads (by administrators) of SVG files that may contain HTML data with a SCRIPT element.
CVE-2015-4721 1 Concrete5 1 Concrete5 2017-09-11 4.3 MEDIUM 6.1 MEDIUM
Multiple cross-site scripting (XSS) vulnerabilities in Concrete5 5.7.3.1.
CVE-2017-8082 1 Concrete5 1 Concrete5 2017-04-27 4.3 MEDIUM 6.5 MEDIUM
concrete5 8.1.0 has CSRF in Thumbnail Editor in the File Manager, which allows remote attackers to disable the entire installation by merely tricking an admin into viewing a malicious page involving the /tools/required/files/importers/imageeditor?fID=1&imgData= URI. This results in a site-wide denial of service making the site not accessible to any users or any administrators.
CVE-2017-6905 1 Concrete5 1 Concrete5 2017-03-23 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in concrete5 <= 5.6.3.4. The vulnerability exists due to insufficient filtration of user-supplied data (disable_choose) passed to the "concrete5-legacy-master/web/concrete/tools/files/search_dialog.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.
CVE-2017-6908 1 Concrete5 1 Concrete5 2017-03-22 4.3 MEDIUM 6.1 MEDIUM
An issue was discovered in concrete5 <= 5.6.3.4. The vulnerability exists due to insufficient filtration of user-supplied data (fID) passed to the "concrete5-legacy-master/web/concrete/tools/files/selector_data.php" URL. An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website.