Exponent CMS 2.6.0patch2 allows an authenticated user to inject persistent JavaScript code on the "User-Agent" header when logging in. When an administrator user visits the "User Sessions" tab, the JavaScript will be triggered allowing an attacker to compromise the administrator session.
Max CVSS
5.4
EPSS Score
0.06%
Published
2022-02-09
Updated
2022-02-17
Exponent CMS 2.6.0patch2 allows an authenticated admin user to upload a malicious extension in the format of a ZIP file with a PHP file inside it. After upload it, the PHP file will be placed at "themes/simpletheme/{rce}.php" from where can be accessed in order to execute commands.
Max CVSS
7.2
EPSS Score
0.22%
Published
2022-02-09
Updated
2022-02-17
Exponent CMS 2.6.0patch2 allows an authenticated admin user to inject persistent JavaScript code inside the "Site/Organization Name","Site Title" and "Site Header" parameters while updating the site settings on "/exponentcms/administration/configure_site"
Max CVSS
4.8
EPSS Score
0.06%
Published
2022-02-09
Updated
2022-02-16
SQL Injection vulnerability in Exponent-CMS v.2.6.0 fixed in 2.7.0 allows attackers to gain access to sensitive information via the selectValue function in the expConfig class.
Max CVSS
7.5
EPSS Score
0.12%
Published
2023-02-17
Updated
2023-02-28
In Exponent CMS before 2.4.1 Patch #6, certain admin users can elevate their privileges.
Max CVSS
7.2
EPSS Score
0.09%
Published
2018-03-04
Updated
2019-10-03
In Exponent CMS before 2.4.1 Patch #5, XSS in elFinder is possible in framework/modules/file/connector/elfinder.php.
Max CVSS
6.1
EPSS Score
0.14%
Published
2017-04-24
Updated
2017-04-29
Exponent CMS 2.4.1 and earlier has SQL injection via a base64 serialized API key (apikey parameter) in the api function of framework/modules/eaas/controllers/eaasController.php.
Max CVSS
9.8
EPSS Score
15.24%
Published
2017-04-22
Updated
2020-04-28
An issue was discovered in Exponent CMS 2.4.1. This is a blind SQL injection that can be exploited by un-authenticated users via an HTTP GET request and which can be used to dump database data out to a malicious server, using an out-of-band technique, such as select_loadfile(). The vulnerability affects source_selector.php and the following parameter: src.
Max CVSS
9.8
EPSS Score
0.18%
Published
2017-02-06
Updated
2017-02-08
In framework/modules/core/controllers/expCommentController.php of Exponent CMS 2.4.0, content_id input is passed into showComments. The method showComments is defined in the expCommentControllercontroller with the parameter '$this->params['content_id']' used directly in SQL. Impact is a SQL injection.
Max CVSS
9.8
EPSS Score
0.18%
Published
2016-11-29
Updated
2017-07-28
In framework/modules/navigation/controllers/navigationController.php in Exponent CMS v2.4.0 or older, the parameter "target" of function "DragnDropReRank" is directly used without any filtration which caused SQL injection. The payload can be used like this: /navigation/DragnDropReRank/target/1.
Max CVSS
9.8
EPSS Score
0.18%
Published
2016-11-11
Updated
2017-07-28
In /framework/modules/notfound/controllers/notfoundController.php of Exponent CMS 2.4.0 patch1, untrusted input is passed into getSearchResults. The method getSearchResults is defined in the search model with the parameter '$term' used directly in SQL. Impact is a SQL injection.
Max CVSS
9.8
EPSS Score
0.20%
Published
2016-11-15
Updated
2016-11-29
framework/modules/users/controllers/usersController.php in Exponent CMS v2.4.0patch1 does not properly restrict access to user records, which allows remote attackers to read address information, as demonstrated by an address/show/id/1 URI.
Max CVSS
5.3
EPSS Score
0.21%
Published
2016-11-11
Updated
2017-07-28
framework/modules/addressbook/controllers/addressController.php in Exponent CMS v2.4.0 allows remote attackers to read user information via a modified id number, as demonstrated by address/edit/id/1, related to an "addresses, countries, and regions" issue.
Max CVSS
5.3
EPSS Score
0.21%
Published
2016-11-11
Updated
2017-07-28
getUsersByJSON in framework/modules/users/controllers/usersController.php in Exponent CMS v2.4.0 allows remote attackers to read user information via users/getUsersByJSON/sort/ and a trailing string.
Max CVSS
5.3
EPSS Score
0.21%
Published
2016-11-11
Updated
2017-07-28
SQL Injection in framework/core/subsystems/expRouter.php in Exponent CMS v2.4.0 allows remote attackers to read database information via address/addContentToSearch/id/ and a trailing string, related to a "sef URL" issue.
Max CVSS
7.5
EPSS Score
0.12%
Published
2016-11-11
Updated
2017-07-28
SQL Injection in framework/modules/search/controllers/searchController.php in Exponent CMS v2.4.0 allows remote attackers to read database information via action=search&module=search with the search_string parameter.
Max CVSS
7.5
EPSS Score
0.12%
Published
2016-11-11
Updated
2017-07-28
A Blind SQL Injection Vulnerability in Exponent CMS through 2.4.0, with the rerank array parameter, can lead to site database information disclosure and denial of service.
Max CVSS
9.1
EPSS Score
0.16%
Published
2016-11-11
Updated
2016-11-29
Multiple SQL injection vulnerabilities in the update method in framework/modules/core/controllers/expRatingController.php in Exponent CMS 2.4.0 allow remote authenticated users to execute arbitrary SQL commands via the (1) content_type or (2) subtype parameter.
Max CVSS
8.8
EPSS Score
0.11%
Published
2016-11-07
Updated
2016-11-29
In /framework/modules/core/controllers/expHTMLEditorController.php of Exponent CMS 2.4.0, untrusted input is used to construct a table name, and in the selectObject method in mysqli class, table names are wrapped with a character that common filters do not filter, allowing for SQL Injection. Impact is Information Disclosure.
Max CVSS
7.5
EPSS Score
0.09%
Published
2016-11-04
Updated
2016-11-29
In /framework/modules/ecommerce/controllers/orderController.php of Exponent CMS 2.4.0, untrusted input is passed into selectObjectsBySql. The method selectObjectsBySql of class mysqli_database uses the injectProof method to prevent SQL injection, but this filter can be bypassed easily: it only sanitizes user input if there are odd numbers of ' or " characters. Impact is Information Disclosure.
Max CVSS
7.5
EPSS Score
0.12%
Published
2016-11-04
Updated
2016-11-29
Exponent CMS 2.4 uses PHP reflection to call a method of a controller class, and then uses the method name to check user permission. But, the method name in PHP reflection is case insensitive, and Exponent CMS permits undefined actions to execute by default, so an attacker can use a capitalized method name to bypass the permission check, e.g., controller=expHTMLEditor&action=preview&editor=ckeditor and controller=expHTMLEditor&action=Preview&editor=ckeditor. An anonymous user will be rejected for the former but can access the latter.
Max CVSS
7.5
EPSS Score
0.11%
Published
2016-11-04
Updated
2016-11-29
Exponent CMS 2.3.9 suffers from a SQL injection vulnerability in "/framework/modules/help/controllers/helpController.php" affecting the version parameter. Impact is Information Disclosure.
Max CVSS
7.5
EPSS Score
0.09%
Published
2016-11-03
Updated
2016-11-29
Exponent CMS 2.3.9 suffers from a SQL injection vulnerability in "/expPaginator.php" affecting the order parameter. Impact is Information Disclosure.
Max CVSS
7.5
EPSS Score
0.10%
Published
2016-11-03
Updated
2016-11-29
SQL injection vulnerability in framework/modules/filedownloads/controllers/filedownloadController.php in Exponent CMS 2.3.9 and earlier allows remote attackers to execute arbitrary SQL commands via the fileid parameter.
Max CVSS
9.8
EPSS Score
0.20%
Published
2017-03-07
Updated
2017-04-04
Exponent CMS before 2.6.0 has improper input validation in fileController.php.
Max CVSS
9.8
EPSS Score
0.23%
Published
2020-12-31
Updated
2021-01-04
59 vulnerabilities found
1 2 3
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!