Weak reset token generation in SeedDMS v6.0.20 and v5.1.7 allows attackers to execute a full account takeover via a brute force attack.
Max CVSS
9.8
EPSS Score
0.23%
Published
2022-12-08
Updated
2022-12-12
SeedDMS versions 6.0.18 and 5.1.25 and below are vulnerable to stored XSS. An attacker with admin privileges can inject the payload inside the "Role management" menu and then trigger the payload by loading the "Users management" menu
Max CVSS
4.8
EPSS Score
0.06%
Published
2022-06-06
Updated
2022-06-14
SeedDMS 6.0.17 and 5.1.24 are vulnerable to Directory Traversal. The "Remove file" functionality inside the "Log files management" menu does not sanitize user input allowing attackers with admin privileges to delete arbitrary files on the remote system.
Max CVSS
6.5
EPSS Score
0.08%
Published
2022-06-06
Updated
2022-06-14
The "Add category" functionality inside the "Global Keywords" menu in "SeedDMS" version 6.0.18 and 5.1.25, is prone to stored XSS which allows an attacker to inject malicious javascript code.
Max CVSS
5.4
EPSS Score
0.06%
Published
2022-06-06
Updated
2022-06-13
Open Redirect vulnerability exists in SeedDMS 6.0.15 in out.Login.php, which llows remote malicious users to redirect users to malicious sites using the "referuri" parameter.
Max CVSS
6.1
EPSS Score
0.10%
Published
2022-02-04
Updated
2022-02-09
SeedDMS v6.0.15 was discovered to contain an open redirect vulnerability. An attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links.
Max CVSS
6.1
EPSS Score
0.05%
Published
2023-07-20
Updated
2023-07-31
A cross-site scripting (XSS) vulnerability in SeedDMS v6.0.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
Max CVSS
6.1
EPSS Score
0.05%
Published
2023-07-24
Updated
2023-08-01
Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.UnlockDocument.php in SeedDMS v5.1.x <5.1.23 and v6.0.x <6.0.16 allows a remote attacker to unlock any document without victim's knowledge, by enticing an authenticated user to visit an attacker's web page.
Max CVSS
4.3
EPSS Score
0.14%
Published
2021-08-03
Updated
2021-08-10
Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.LockDocument.php in SeedDMS v5.1.x<5.1.23 and v6.0.x <6.0.16 allows a remote attacker to lock any document without victim's knowledge, by enticing an authenticated user to visit an attacker's web page.
Max CVSS
4.3
EPSS Score
0.08%
Published
2021-08-03
Updated
2021-08-10
Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.Ajax.php in SeedDMS v5.1.x<5.1.23 and v6.0.x<6.0.16 allows a remote attacker to edit document name without victim's knowledge, by enticing an authenticated user to visit an attacker's web page.
Max CVSS
4.3
EPSS Score
0.08%
Published
2021-08-03
Updated
2021-08-10
An issue discovered in SeedDMS 6.0.15 allows an attacker to escalate privileges via the userid and role parameters in the out.UsrMgr.php file.
Max CVSS
8.8
EPSS Score
0.05%
Published
2023-06-07
Updated
2023-06-15
SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditFolder.php.
Max CVSS
4.3
EPSS Score
0.07%
Published
2021-03-18
Updated
2021-03-22
SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditDocument.php.
Max CVSS
4.3
EPSS Score
0.07%
Published
2021-03-18
Updated
2021-03-22
Cross-site scripting (XSS) exists in SeedDMS 6.0.13 via the folderid parameter to views/bootstrap/class.DropFolderChooser.php.
Max CVSS
6.1
EPSS Score
0.08%
Published
2020-12-07
Updated
2020-12-07
Open redirect in SeedDMS 6.0.13 via the dropfolderfileform1 parameter to out/out.AddDocument.php.
Max CVSS
6.1
EPSS Score
0.08%
Published
2020-11-24
Updated
2020-12-02
SeedDMS Content Management System v6.0.7 contains a persistent cross-site scripting (XSS) vulnerability in the component AddEvent.php via the name and comment parameters.
Max CVSS
6.1
EPSS Score
0.08%
Published
2021-10-22
Updated
2021-10-27
A stored XSS vulnerability was found in SeedDMS 5.1.11 due to poorly escaping the search result in the autocomplete search form placed in the header of out/out.Viewfolder.php.
Max CVSS
6.1
EPSS Score
0.08%
Published
2019-06-28
Updated
2019-07-03
out/out.GroupMgr.php in SeedDMS 5.1.11 has Stored XSS by making a new group with a JavaScript payload as the "GROUP" Name.
Max CVSS
6.1
EPSS Score
0.12%
Published
2019-06-17
Updated
2019-06-24
out/out.UsrMgr.php in SeedDMS before 5.1.11 allows Stored Cross-Site Scripting (XSS) via the name field.
Max CVSS
5.4
EPSS Score
0.12%
Published
2019-06-20
Updated
2019-06-24
SeedDMS before 5.1.11 allows Remote Command Execution (RCE) because of unvalidated file upload of PHP scripts, a different vulnerability than CVE-2018-12940.
Max CVSS
7.5
EPSS Score
0.91%
Published
2019-06-20
Updated
2021-06-25
Persistent Cross-Site Scripting (XSS) vulnerability in the "Categories" feature in SeedDMS (formerly LetoDMS and MyDMS) before 5.1.8 allows remote attackers to inject arbitrary web script or HTML via the name field.
Max CVSS
6.1
EPSS Score
0.09%
Published
2018-07-31
Updated
2018-09-28
Cross-Site Scripting (XSS) vulnerability in every page that includes the "action" URL parameter in SeedDMS (formerly LetoDMS and MyDMS) before 5.1.8 allows remote attackers to inject arbitrary web script or HTML via the action parameter.
Max CVSS
6.1
EPSS Score
0.09%
Published
2018-07-31
Updated
2018-10-04
SQL injection vulnerability in the "Users management" functionality in SeedDMS (formerly LetoDMS and MyDMS) before 5.1.8 allows authenticated attackers to manipulate an SQL query within the application by sending additional SQL commands to the application server. An attacker can use this vulnerability to perform malicious tasks such as to extract, change, or delete sensitive information within the database supporting the application, and potentially run system commands on the underlying operating system.
Max CVSS
9.0
EPSS Score
0.10%
Published
2018-07-31
Updated
2018-09-28
This vulnerability allows remote attackers to execute arbitrary code in SeedDMS (formerly LetoDMS and MyDMS) before 5.1.8 by adding a system command at the end of the "cacheDir" path and following usage of the "Clear Cache" functionality. This allows an authenticated attacker, with permission to the Settings functionality, to inject arbitrary system commands within the application by manipulating the "Cache directory" path. An attacker can use it to perform malicious tasks such as to extract, change, or delete sensitive information or run system commands on the underlying operating system.
Max CVSS
9.0
EPSS Score
0.29%
Published
2018-07-31
Updated
2018-10-09
Unrestricted file upload vulnerability in "op/op.UploadChunks.php" in SeedDMS (formerly LetoDMS and MyDMS) before 5.1.8 allows remote attackers to execute arbitrary code by uploading a file with an executable extension specified by the "qqfile" parameter. This allows an authenticated attacker to upload a malicious file containing PHP code to execute operating system commands to the web root of the application.
Max CVSS
8.8
EPSS Score
0.21%
Published
2018-07-31
Updated
2018-10-01
29 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!