A cross-site scripting (XSS) issue in the ForkCMS version 5.9.3 allows remote attackers to inject JavaScript via the "end_date" Parameter
Max CVSS
4.8
EPSS Score
0.07%
Published
2022-08-12
Updated
2022-08-15
A cross-site scripting (XSS) issue in the Fork version 5.9.3 allows remote attackers to inject JavaScript via the "publish_on_time" Parameter.
Max CVSS
4.8
EPSS Score
0.07%
Published
2022-08-12
Updated
2022-08-15
A cross-site scripting (XSS) issue in the Fork version 5.9.3 allows remote attackers to inject JavaScript via the "publish_on_date" Parameter
Max CVSS
4.8
EPSS Score
0.07%
Published
2022-08-12
Updated
2022-08-15
A stored cross-site scripting (XSS) issue in the ForkCMS version 5.9.3 allows remote attackers to inject JavaScript via the "start_date" Parameter
Max CVSS
4.8
EPSS Score
0.07%
Published
2022-08-12
Updated
2022-08-15
Cross-site Scripting (XSS) - Stored in GitHub repository forkcms/forkcms prior to 5.11.1.
Max CVSS
6.8
EPSS Score
0.05%
Published
2022-03-24
Updated
2022-03-29
Persistent Cross-site scripting vulnerability on Fork CMS version 5.8.2 allows remote attackers to inject arbitrary Javascript code via the "navigation_title" parameter and the "title" parameter in /private/en/pages/add.
Max CVSS
6.1
EPSS Score
0.11%
Published
2021-05-06
Updated
2021-05-12
Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML.
Max CVSS
5.4
EPSS Score
0.06%
Published
2021-10-22
Updated
2021-10-28
Fork before 5.8.3 allows XSS via navigation_title or title.
Max CVSS
6.1
EPSS Score
0.08%
Published
2020-05-27
Updated
2020-05-27
Fork CMS 5.0.6 allows stored XSS via the private/en/settings facebook_admin_ids parameter (aka "Admin ids" input in the Facebook section).
Max CVSS
5.4
EPSS Score
0.06%
Published
2019-01-09
Updated
2019-01-23
In the 5.4.0 version of the Fork CMS software, HTML Injection and Stored XSS vulnerabilities were discovered via the /backend/ajax URI.
Max CVSS
6.1
EPSS Score
0.08%
Published
2018-10-02
Updated
2018-11-16
Fork CMS 5.0.7 has XSS in /private/en/pages/edit via the title parameter.
Max CVSS
5.4
EPSS Score
0.06%
Published
2018-01-04
Updated
2018-01-16
Cross-site scripting (XSS) vulnerability in the loadForm function in Frontend/Modules/Search/Actions/Index.php in Fork CMS before 3.8.4 allows remote attackers to inject arbitrary web script or HTML via the q_widget parameter to en/search.
Max CVSS
6.1
EPSS Score
0.77%
Published
2020-02-08
Updated
2020-02-12
Multiple cross-site scripting (XSS) vulnerabilities in Fork CMS before 3.2.7 allow remote attackers to inject arbitrary web script or HTML via the term parameter to (1) autocomplete.php, (2) search/ajax/autosuggest.php, (3) livesuggest.php, or (4) save.php in frontend/modules/search/ajax.
Max CVSS
4.3
EPSS Score
0.31%
Published
2012-09-26
Updated
2017-08-29
Cross-site scripting (XSS) vulnerability in backend/core/engine/base.php in Fork CMS 3.2.4 and possibly other versions before 3.2.5 allows remote attackers to inject arbitrary web script or HTML via the highlight parameter.
Max CVSS
4.3
EPSS Score
0.22%
Published
2012-02-24
Updated
2018-01-11
Multiple cross-site scripting (XSS) vulnerabilities in backend/core/engine/base.php in Fork CMS 3.2.4 and possibly other versions before 3.2.5 allow remote attackers to inject arbitrary web script or HTML via the (1) report parameter to blog/settings or (2) error parameter to users/index.
Max CVSS
4.3
EPSS Score
1.06%
Published
2012-02-24
Updated
2012-02-24
Multiple cross-site scripting (XSS) vulnerabilities in Fork CMS before 3.2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) type or (2) querystring parameters to private/en/error or (3) name parameter to private/en/locale/index.
Max CVSS
4.3
EPSS Score
2.46%
Published
2012-09-26
Updated
2017-08-29
16 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!