** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in WolfCMS up to 0.8.3.1. It has been rated as problematic. This issue affects some unknown processing of the file /wolfcms/?/admin/user/add of the component User Add. The manipulation of the argument name leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-135125 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Max CVSS
6.1
EPSS Score
0.07%
Published
2022-06-09
Updated
2024-03-21
Wolf CMS v0.8.3.1 is affected by cross site scripting (XSS) in the module Add Snippet (/?/admin/snippet/add). This allows an attacker to insert arbitrary JavaScript as user input, which will be executed whenever the affected snippet is loaded.
Max CVSS
6.1
EPSS Score
0.09%
Published
2019-03-30
Updated
2020-07-29
WolfCMS version version 0.8.3.1 contains a Reflected Cross Site Scripting vulnerability in "Create New File" and "Create New Directory" input box from 'files' Tab that can result in Session Hijacking, Spread Worms,Control the browser remotely. . This attack appear to be exploitable via Attacker can execute the JavaScript into the "Create New File" and "Create New Directory" input box from 'files'.
Max CVSS
4.8
EPSS Score
0.05%
Published
2018-03-13
Updated
2018-04-10
WOlfCMS WolfCMS version version 0.8.3.1 contains a Stored Cross-Site Scripting vulnerability in Layout Name (from Layout tab) that can result in low privilege user can steal the cookie of admin user and compromise the admin account. This attack appear to be exploitable via Need to enter the Javascript code into Layout Name .
Max CVSS
5.4
EPSS Score
0.06%
Published
2018-03-13
Updated
2018-04-06
WolfCMS v0.8.3.1 allows XSS via an SVG file to /?/admin/plugin/file_manager/browse/.
Max CVSS
4.8
EPSS Score
0.13%
Published
2019-04-25
Updated
2020-07-29
WolfCMS 0.8.3.1 allows XSS via an SVG file to /?/admin/plugin/file_manager/browse/.
Max CVSS
4.8
EPSS Score
0.13%
Published
2019-04-25
Updated
2020-07-29
WolfCMS 0.8.3.1 has XSS via the /?/admin/page/add slug parameter.
Max CVSS
4.8
EPSS Score
0.05%
Published
2018-08-25
Updated
2018-10-17
Wolf CMS 0.8.3.1 has XSS in the Snippets tab, as demonstrated by a ?/admin/snippet/edit/1 URI.
Max CVSS
4.8
EPSS Score
0.06%
Published
2018-08-10
Updated
2018-10-05
Cross-site request forgery (CSRF) vulnerability in WolfCMS 0.8.3.1 allows remote attackers to hijack the authentication of users for requests that modify plugin/[pluginname]/settings by crafting a malicious request.
Max CVSS
6.5
EPSS Score
0.29%
Published
2018-04-04
Updated
2018-05-09
Open redirect vulnerability in the login[redirect] parameter login functionality in WolfCMS 0.8.3.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a malformed URL.
Max CVSS
4.9
EPSS Score
1.90%
Published
2018-04-04
Updated
2018-05-10
Cross-site scripting (XSS) vulnerability in Wolf CMS 0.8.3.1 via the page editing feature, as demonstrated by /?/admin/page/edit/3.
Max CVSS
4.8
EPSS Score
0.07%
Published
2018-02-22
Updated
2018-03-06
Wolf CMS 0.8.3.1 allows Cross-Site Scripting (XSS) attacks. The vulnerability exists due to insufficient sanitization of the file name in a "create-file-popup" action, and the directory name in a "create-directory-popup" action, in the HTTP POST method to the "/plugin/file_manager/" script (aka an /admin/plugin/file_manager/browse// URI).
Max CVSS
5.4
EPSS Score
0.06%
Published
2017-09-08
Updated
2017-09-14
Wolf CMS before 0.8.3.1 allows unrestricted file rename and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not prevent a change of a file extension to ".php" after originally using the parameter "filename" for uploading a JPEG image. Exploitation requires a registered user who has access to upload functionality.
Max CVSS
8.8
EPSS Score
0.70%
Published
2017-04-14
Updated
2017-09-17
Wolf CMS before 0.8.3.1 allows unrestricted file upload and PHP Code Execution because admin/plugin/file_manager/browse/ (aka the filemanager) does not validate the parameter "filename" properly. Exploitation requires a registered user who has access to upload functionality.
Max CVSS
8.8
EPSS Score
0.49%
Published
2017-04-14
Updated
2017-09-17
A cross-site scripting (XSS) vulnerability in Wolf CMS 0.75 and earlier allows remote attackers to inject arbitrary web script or HTML via the setting[admin_email] parameter to admin/setting.
Max CVSS
4.8
EPSS Score
0.06%
Published
2020-02-19
Updated
2020-02-20
Multiple cross-site request forgery (CSRF) vulnerabilities in Wolf CMS 0.75 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) delete users via the user id number to admin/user/delete; (2) delete pages via the page id number to admin/page/delete; delete the (3) images or (4) themes directory via the directory name to admin/plugin/file_manager/delete, and possibly other directories; or (5) logout the user via a request to admin/login/logout.
Max CVSS
6.8
EPSS Score
0.20%
Published
2012-10-01
Updated
2012-10-05
16 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!