Show filters
35 Total Results
Displaying 11-20 of 35
Sort by:
Attacker Value
Unknown

CVE-2021-40219

Disclosure Date: April 11, 2022 (last updated February 23, 2025)
Bolt CMS <= 4.2 is vulnerable to Remote Code Execution. Unsafe theme rendering allows an authenticated attacker to edit theme to inject server-side template injection that leads to remote code execution.
Attacker Value
Unknown

CVE-2022-24227

Disclosure Date: February 15, 2022 (last updated February 23, 2025)
A cross-site scripting (XSS) vulnerability in BoltWire v7.10 and v 8.00 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the name and lastname parameters.
Attacker Value
Unknown

CVE-2021-24976

Disclosure Date: January 24, 2022 (last updated February 23, 2025)
The Smart SEO Tool WordPress plugin before 3.0.6 does not sanitise and escape the search parameter before outputting it back in an attribute when the TDK optimisation setting is enabled, leading to a Reflected Cross-Site Scripting
Attacker Value
Unknown

CVE-2021-24618

Disclosure Date: September 20, 2021 (last updated February 23, 2025)
The Donate With QRCode WordPress plugin before 1.4.5 does not sanitise or escape its QRCode Image setting, which result into a Stored Cross-Site Scripting (XSS). Furthermore, the plugin also does not have any CSRF and capability checks in place when saving such setting, allowing any authenticated user (as low as subscriber), or unauthenticated user via a CSRF vector to update them and perform such attack.
Attacker Value
Unknown

CVE-2021-27367

Disclosure Date: February 17, 2021 (last updated February 22, 2025)
Controller/Backend/FileEditController.php and Controller/Backend/FilemanagerController.php in Bolt before 4.1.13 allow Directory Traversal.
Attacker Value
Unknown

CVE-2020-28925

Disclosure Date: December 30, 2020 (last updated November 28, 2024)
Bolt before 3.7.2 does not restrict filter options in a Request in the Twig context, and is therefore inconsistent with the "How to Harden Your PHP for Better Security" guidance.
Attacker Value
Unknown

CVE-2020-7370

Disclosure Date: October 20, 2020 (last updated February 22, 2025)
User Interface (UI) Misrepresentation of Critical Information vulnerability in the address bar of Danyil Vasilenko's Bolt Browser allows an attacker to obfuscate the true source of data as presented in the browser. This issue affects the Bolt Browser version 1.4 and prior versions.
Attacker Value
Unknown

CVE-2020-4041

Disclosure Date: June 08, 2020 (last updated February 21, 2025)
In Bolt CMS before version 3.7.1, the filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it. Additionally, the measures to prevent renaming the file to disallowed filename extensions could be circumvented. This is fixed in Bolt 3.7.1.
Attacker Value
Unknown

CVE-2020-4040

Disclosure Date: June 08, 2020 (last updated February 21, 2025)
Bolt CMS before version 3.7.1 lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview. This has been fixed in Bolt 3.7.1
Attacker Value
Unknown

CVE-2013-0737

Disclosure Date: January 02, 2020 (last updated February 21, 2025)
Cross-site scripting (XSS) vulnerability in BoltWire 3.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the fieldnames parameter.