Vulnerabilities
Vulnerable Software
Modx:  >> Modx Revolution  >> 1.7.0  Security Vulnerabilities
MODX Revolution Gallery 1.7.0 is affected by: CWE-434: Unrestricted Upload of File with Dangerous Type. The impact is: Creating file with custom a filename and content. The component is: Filtering user parameters before passing them into phpthumb class. The attack vector is: web request via /assets/components/gallery/connector.php.
CVSS Score
7.5
EPSS Score
0.002
Published
2019-07-23
MODX Revolution through v2.7.0-pl allows XSS via the User Photo field.
CVSS Score
6.1
EPSS Score
0.002
Published
2019-02-06
MODX Revolution through v2.7.0-pl allows XSS via a document resource (such as pagetitle), which is mishandled during an Update action, a Quick Edit action, or the viewing of manager logs.
CVSS Score
6.1
EPSS Score
0.002
Published
2019-02-06
MODX Revolution through v2.7.0-pl allows XSS via an extended user field such as Container name or Attribute name.
CVSS Score
6.1
EPSS Score
0.002
Published
2019-02-06
MODX Revolution through v2.7.0-pl allows XSS via User Settings such as Description.
CVSS Score
5.4
EPSS Score
0.002
Published
2019-02-06
MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68.
CVSS Score
7.2
EPSS Score
0.04
Published
2018-07-13
MODX Revolution version <=2.6.4 contains a Directory Traversal vulnerability in /core/model/modx/modmanagerrequest.class.php that can result in remove files. This attack appear to be exploitable via web request via security/login processor. This vulnerability appears to have been fixed in pull 13980.
CVSS Score
7.5
EPSS Score
0.003
Published
2018-07-13
A stored web content injection vulnerability (WCI, a.k.a XSS) is present in MODX Revolution CMS version 2.5.6 and earlier. An authenticated user with permissions to edit users can save malicious JavaScript as a User Group name and potentially take control over victims' accounts. This can lead to an escalation of privileges providing complete administrative control over the CMS.
CVSS Score
5.4
EPSS Score
0.003
Published
2017-11-17
Cross-site scripting (XSS) vulnerability in login-fsp.html in MODX Revolution before 1.9.1 allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING.
CVSS Score
6.1
EPSS Score
0.002
Published
2017-08-29
In MODX Revolution before 2.5.7, an attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter.
CVSS Score
6.1
EPSS Score
0.002
Published
2017-05-18


Contact Us

Shodan ® - All rights reserved