An arbitrary file upload vulnerability in the component /inc/modules_install.php of Pluck-CMS v4.7.18 allows attackers to execute arbitrary code via uploading a crafted ZIP file.
Max CVSS
8.8
EPSS Score
0.06%
Published
2023-12-14
Updated
2023-12-18
An issue discovered in /admin.php in Pluck CMS 4.7.15 through 4.7.16-dev5 allows remote attackers to run arbitrary code via manage file functionality.
Max CVSS
7.2
EPSS Score
0.10%
Published
2023-06-22
Updated
2023-06-30
Cross Site Scripting (XSS) vulnerability in /admin.php in Pluck CMS 4.7.15 through 4.7.16-dev4 allows remote attackers to run arbitrary code via upload of crafted html file.
Max CVSS
4.8
EPSS Score
0.05%
Published
2023-06-26
Updated
2023-07-05
Pluck CMS is vulnerable to an authenticated remote code execution (RCE) vulnerability through its “albums” module. Albums are used to create collections of images that can be inserted into web pages across the site. Albums allow the upload of various filetypes, which undergo a normalization process before being available on the site. Due to lack of file extension validation, it is possible to upload a crafted JPEG payload containing an embedded PHP web-shell. An attacker may navigate to it directly to achieve RCE on the underlying web server. Administrator credentials for the Pluck CMS web interface are required to access the albums module feature, and are thus required to exploit this vulnerability. CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C (8.2 High)
Max CVSS
7.2
EPSS Score
0.13%
Published
2023-03-27
Updated
2023-03-31
A vulnerability has been found in Pluck CMS 4.7.18 and classified as problematic. This vulnerability affects unknown code of the file install.php of the component Installation Handler. The manipulation of the argument contents with the input <script>alert('xss')</script> leads to cross site scripting. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-239854 is the identifier assigned to this vulnerability.
Max CVSS
5.4
EPSS Score
0.05%
Published
2023-09-16
Updated
2024-04-11
A Cross-Site Request Forgery (CSRF) in Pluck CMS v4.7.15 allows attackers to change the password of any given user by exploiting this feature leading to account takeover.
Max CVSS
8.8
EPSS Score
0.11%
Published
2022-03-30
Updated
2022-04-05
In Pluck 4.7.16, an admin user can use the theme upload functionality at /admin.php?action=themeinstall to perform remote code execution.
Max CVSS
7.2
EPSS Score
2.89%
Published
2022-03-18
Updated
2022-03-25
A Cross-Site Request Forgery (CSRF) in Pluck CMS v4.7.15 allows attackers to delete arbitrary pages.
Max CVSS
6.5
EPSS Score
0.05%
Published
2022-04-13
Updated
2022-04-20
Missing SSL Certificate Validation issue exists in Pluck 4.7.15 in update_applet.php, which could lead to man-in-the-middle attacks.
Max CVSS
5.8
EPSS Score
0.07%
Published
2021-12-10
Updated
2021-12-14
Zip Slip vulnerability in Pluck-CMS Pluck 4.7.15 allows an attacker to upload specially crafted zip files, resulting in directory traversal and potentially arbitrary code execution.
Max CVSS
9.8
EPSS Score
0.22%
Published
2021-12-10
Updated
2021-12-14
Session Fixation vulnerability in login.php in Pluck-CMS Pluck 4.7.15 allows an attacker to sustain unauthorized access to the platform. Because Pluck does not invalidate prior sessions after a password change, access can be sustained even after an administrator performs regular remediation attempts such as resetting their password.
Max CVSS
7.5
EPSS Score
0.21%
Published
2021-12-10
Updated
2021-12-14
In Pluck-4.7.15 admin background a remote command execution vulnerability exists when uploading files.
Max CVSS
8.1
EPSS Score
0.36%
Published
2021-12-10
Updated
2021-12-14
A file upload restriction bypass vulnerability in Pluck CMS before 4.7.13 allows an admin privileged user to gain access in the host through the "manage files" functionality, which may result in remote code execution.
Max CVSS
7.2
EPSS Score
3.58%
Published
2020-12-16
Updated
2022-02-07
An issue was discovered in Pluck 4.7.10-dev2. There is a CSRF vulnerability that can editpage via a /admin.php?action=editpage
Max CVSS
4.3
EPSS Score
0.06%
Published
2021-05-18
Updated
2021-05-24
An issue was discovered in Pluck CMS 4.7.10-dev2 and 4.7.11. There is a file upload vulnerability that can cause a remote command execution via admin.php?action=files.
Max CVSS
8.8
EPSS Score
0.18%
Published
2020-09-30
Updated
2021-09-21
File Upload vulnerability in PluckCMS v.4.7.10 allows a remote attacker to execute arbitrary code via the trashcan_restoreitem.php file.
Max CVSS
7.2
EPSS Score
0.39%
Published
2023-06-20
Updated
2023-06-27
In Pluck-4.7.10-dev2 admin background, a remote command execution vulnerability exists when uploading files.
Max CVSS
9.8
EPSS Score
1.40%
Published
2021-05-18
Updated
2022-10-26
File upload vulnerability in Pluck CMS v.4.7.10-dev2 allows a remote attacker to execute arbitrary code and access sensitive information via the theme.php file.
Max CVSS
7.2
EPSS Score
0.08%
Published
2023-06-20
Updated
2023-06-27
An issue discovered in Pluck CMS v.4.7.10-dev2 allows a remote attacker to execute arbitrary php code via the hidden parameter to admin.php when editing a page.
Max CVSS
7.2
EPSS Score
0.12%
Published
2023-06-20
Updated
2023-06-27
File Upload vulnerability in PluckCMS v.4.7.10 dev versions allows a remote attacker to execute arbitrary code via a crafted image file to the the save_file() parameter.
Max CVSS
9.8
EPSS Score
0.92%
Published
2023-06-20
Updated
2023-06-28
Cross Site Request Forgery (CSRF) in Pluck CMS v4.7.9 allows remote attackers to execute arbitrary code and delete specific images via the component " /admin.php?action=images."
Max CVSS
8.8
EPSS Score
0.18%
Published
2021-05-17
Updated
2021-05-24
Cross Site Request Forgery (CSRF) in Pluck CMS v4.7.9 allows remote attackers to execute arbitrary code and delete a specific article via the component " /admin.php?action=page."
Max CVSS
8.8
EPSS Score
0.18%
Published
2021-05-17
Updated
2021-05-24
PluckCMS 4.7.4 and earlier is affected by: CWE-434 Unrestricted Upload of File with Dangerous Type. The impact is: get webshell. The component is: data/inc/images.php line36. The attack vector is: modify the MIME TYPE on HTTP request to upload a php file. The fixed version is: after commit 09f0ab871bf633973cfd9fc4fe59d4a912397cf8.
Max CVSS
9.8
EPSS Score
0.21%
Published
2019-07-16
Updated
2019-10-09
data/inc/files.php in Pluck 4.7.8 allows remote attackers to execute arbitrary code by uploading a .htaccess file that specifies SetHandler x-httpd-php for a .txt file, because only certain PHP-related filename extensions are blocked.
Max CVSS
9.8
EPSS Score
1.94%
Published
2019-04-19
Updated
2019-04-22
An issue was discovered in Pluck 4.7.9-dev1. There is a CSRF vulnerability that can delete pictures via a /admin.php?action=deleteimage&var1= URI.
Max CVSS
6.5
EPSS Score
0.06%
Published
2019-02-23
Updated
2019-02-25
43 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!