CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   

Modx » Modx Revolution : Security Vulnerabilities

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2020-25911 611 DoS 2021-10-31 2021-11-02
6.4
None Remote Low Not required Partial None Partial
A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).
2 CVE-2019-1010123 434 2019-07-23 2019-10-09
5.0
None Remote Low Not required None Partial None
MODX Revolution Gallery 1.7.0 is affected by: CWE-434: Unrestricted Upload of File with Dangerous Type. The impact is: Creating file with custom a filename and content. The component is: Filtering user parameters before passing them into phpthumb class. The attack vector is: web request via /assets/components/gallery/connector.php.
3 CVE-2018-1000208 22 Dir. Trav. 2018-07-13 2018-09-07
6.4
None Remote Low Not required None Partial Partial
MODX Revolution version <=2.6.4 contains a Directory Traversal vulnerability in /core/model/modx/modmanagerrequest.class.php that can result in remove files. This attack appear to be exploitable via web request via security/login processor. This vulnerability appears to have been fixed in pull 13980.
4 CVE-2018-1000207 732 2018-07-13 2019-10-03
6.5
None Remote Low ??? Partial Partial Partial
MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68.
5 CVE-2018-20758 79 XSS 2019-02-06 2019-10-23
3.5
None Remote Medium ??? None Partial None
MODX Revolution through v2.7.0-pl allows XSS via User Settings such as Description.
6 CVE-2018-20757 79 XSS 2019-02-06 2019-02-06
4.3
None Remote Medium Not required None Partial None
MODX Revolution through v2.7.0-pl allows XSS via an extended user field such as Container name or Attribute name.
7 CVE-2018-20756 79 XSS 2019-02-06 2019-02-06
4.3
None Remote Medium Not required None Partial None
MODX Revolution through v2.7.0-pl allows XSS via a document resource (such as pagetitle), which is mishandled during an Update action, a Quick Edit action, or the viewing of manager logs.
8 CVE-2018-20755 79 XSS 2019-02-06 2019-02-06
4.3
None Remote Medium Not required None Partial None
MODX Revolution through v2.7.0-pl allows XSS via the User Photo field.
9 CVE-2018-17556 79 XSS 2018-09-26 2018-11-15
3.5
None Remote Medium ??? None Partial None
MODX Revolution v2.6.5-pl allows stored XSS via a Create New Media Source action.
10 CVE-2018-10382 79 XSS 2018-06-01 2018-06-27
3.5
None Remote Medium ??? None Partial None
MODX Revolution 2.6.3 has XSS.
11 CVE-2017-1000223 79 XSS 2017-11-17 2017-12-01
3.5
None Remote Medium ??? None Partial None
A stored web content injection vulnerability (WCI, a.k.a XSS) is present in MODX Revolution CMS version 2.5.6 and earlier. An authenticated user with permissions to edit users can save malicious JavaScript as a User Group name and potentially take control over victims' accounts. This can lead to an escalation of privileges providing complete administrative control over the CMS.
12 CVE-2017-11744 79 XSS 2017-07-30 2017-08-02
4.3
None Remote Medium Not required None Partial None
In MODX Revolution 2.5.7, the "key" and "name" parameters in the System Settings module are vulnerable to XSS. A malicious payload sent to connectors/index.php will be triggered by every user, when they visit this module.
13 CVE-2017-9071 79 XSS 2017-05-18 2017-05-30
2.6
None Remote High Not required None Partial None
In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.
14 CVE-2017-9070 79 XSS 2017-05-18 2017-05-30
3.5
None Remote Medium ??? None Partial None
In MODX Revolution before 2.5.7, a user with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to connectors/index.php.
15 CVE-2017-9069 434 Exec Code 2017-05-18 2017-05-30
6.5
None Remote Low ??? Partial Partial Partial
In MODX Revolution before 2.5.7, a user with file upload permissions is able to execute arbitrary code by uploading a file with the name .htaccess.
16 CVE-2017-9068 79 XSS 2017-05-18 2017-05-30
4.3
None Remote Medium Not required None Partial None
In MODX Revolution before 2.5.7, an attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter.
17 CVE-2017-9067 22 Dir. Trav. 2017-05-18 2017-05-31
4.4
None Local Medium Not required Partial Partial Partial
In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.
18 CVE-2017-8115 22 Dir. Trav. +Info 2017-04-25 2017-05-05
5.0
None Remote Low Not required Partial None None
Directory traversal in setup/processors/url_search.php (aka the search page of an unused processor) in MODX Revolution 2.5.7 might allow remote attackers to obtain system directory information.
19 CVE-2017-7324 94 Exec Code 2017-03-30 2020-01-10
7.5
None Remote Low Not required Partial Partial Partial
setup/templates/findcore.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the core_path parameter.
20 CVE-2017-7323 Exec Code 2017-03-30 2020-01-10
6.8
None Remote Medium Not required Partial Partial Partial
The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism.
21 CVE-2017-7322 295 Exec Code 2017-03-30 2020-01-10
6.8
None Remote Medium Not required Partial Partial Partial
The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier do not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code via a crafted certificate.
22 CVE-2017-7321 94 Exec Code 2017-03-30 2020-01-10
7.5
None Remote Low Not required Partial Partial Partial
setup/controllers/welcome.php in MODX Revolution 2.5.4-pl and earlier allows remote attackers to execute arbitrary PHP code via the config_key parameter to the setup/index.php?action=welcome URI.
23 CVE-2017-7320 79 DoS XSS Http R.Spl. 2017-03-30 2020-01-10
4.3
None Remote Medium Not required None Partial None
setup/controllers/language.php in MODX Revolution 2.5.4-pl and earlier does not properly constrain the language parameter, which allows remote attackers to conduct Cookie-Bombing attacks and cause a denial of service (cookie quota exhaustion), or conduct HTTP Response Splitting attacks with resultant XSS, via an invalid parameter value.
24 CVE-2016-10039 22 Dir. Trav. File Inclusion 2016-12-24 2019-11-14
7.5
None Remote Low Not required Partial Partial Partial
Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/getfiles.
25 CVE-2016-10038 22 Dir. Trav. File Inclusion 2016-12-24 2016-12-29
7.5
None Remote Low Not required Partial Partial Partial
Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted dir parameter, related to browser/directory/remove.
26 CVE-2016-10037 22 Dir. Trav. File Inclusion 2016-12-24 2019-11-14
7.5
None Remote Low Not required Partial Partial Partial
Directory traversal in /connectors/index.php in MODX Revolution before 2.5.2-pl allows remote attackers to perform local file inclusion/traversal/manipulation via a crafted id (aka dir) parameter, related to browser/directory/getlist.
27 CVE-2015-6588 79 XSS 2017-08-29 2017-09-02
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in login-fsp.html in MODX Revolution before 1.9.1 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING.
28 CVE-2014-8992 79 XSS 2014-12-22 2019-10-22
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in manager/assets/fileapi/FileAPI.flash.image.swf in MODX Revolution 2.3.2-pl allows remote attackers to inject arbitrary web script or HTML via the callback parameter.
29 CVE-2014-8775 200 +Info 2014-12-03 2019-10-22
5.0
None Remote Low Not required Partial None None
MODX Revolution 2.x before 2.2.15 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
30 CVE-2014-8774 79 XSS 2014-12-03 2019-10-22
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in manager/index.php in MODX Revolution 2.x before 2.2.15 allows remote attackers to inject arbitrary web script or HTML via the context_key parameter.
31 CVE-2014-8773 352 Bypass CSRF 2014-12-03 2019-10-22
6.8
None Remote Medium Not required Partial Partial Partial
MODX Revolution 2.x before 2.2.15 allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism by (1) omitting the CSRF token or via a (2) long string in the CSRF token parameter.
32 CVE-2014-5451 79 XSS 2014-11-06 2018-10-09
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in manager/templates/default/header.tpl in MODX Revolution 2.3.1-pl and earlier allows remote attackers to inject arbitrary web script or HTML via the "a" parameter to manager/. NOTE: this issue exists because of a CVE-2014-2080 regression.
33 CVE-2014-2736 89 Exec Code Sql 2014-04-24 2019-10-22
7.5
None Remote Low Not required Partial Partial Partial
Multiple SQL injection vulnerabilities in MODX Revolution before 2.2.14 allow remote attackers to execute arbitrary SQL commands via the (1) session ID (PHPSESSID) to index.php or remote authenticated users to execute arbitrary SQL commands via the (2) user parameter to connectors/security/message.php or (3) id parameter to manager/index.php.
34 CVE-2014-2311 89 Exec Code Sql 2014-03-11 2019-10-22
7.5
None Remote Low Not required Partial Partial Partial
SQL injection vulnerability in modx.class.php in MODX Revolution 2.0.0 before 2.2.13 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
35 CVE-2014-2080 79 XSS 2014-03-01 2015-07-30
4.3
None Remote Medium Not required None Partial None
Cross-site scripting (XSS) vulnerability in manager/templates/default/header.tpl in ModX Revolution before 2.2.11 allows remote attackers to inject arbitrary web script or HTML via the "a" parameter.
36 CVE-2010-5278 22 1 Dir. Trav. 2012-10-07 2020-01-10
4.3
None Remote Medium Not required Partial None None
Directory traversal vulnerability in manager/controllers/default/resource/tvs.php in MODx Revolution 2.0.2-pl, and possibly earlier, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the class_key parameter. NOTE: some of these details are obtained from third party information.
Total number of vulnerabilities : 36   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.