Show filters
48 Total Results
Displaying 1-10 of 48
Sort by:
Attacker Value
Low

CVE-2021-32648

Disclosure Date: August 26, 2021 (last updated February 19, 2025)
octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.
Attacker Value
Unknown

CVE-2024-25637

Disclosure Date: June 26, 2024 (last updated June 27, 2024)
October is a self-hosted CMS platform based on the Laravel PHP Framework. The X-October-Request-Handler Header does not sanitize the AJAX handler name and allows unescaped HTML to be reflected back. There is no impact since this vulnerability cannot be exploited through normal browser interactions. This unescaped value is only detectable when using a proxy interception tool. This issue has been patched in version 3.5.15.
0
Attacker Value
Unknown

CVE-2024-24764

Disclosure Date: June 26, 2024 (last updated September 20, 2024)
October is a self-hosted CMS platform based on the Laravel PHP Framework. This issue affects authenticated administrators who may be redirected to an untrusted URL using the PageFinder schema. The resolver for the page finder link schema (`october://`) allowed external links, therefore allowing an open redirect outside the scope of the active host. This vulnerability has been patched in version 3.5.15.
Attacker Value
Unknown

CVE-2023-25365

Disclosure Date: February 08, 2024 (last updated February 16, 2024)
Cross Site Scripting vulnerability found in October CMS v.3.2.0 allows local attacker to execute arbitrary code via the file type .mp3
Attacker Value
Unknown

CVE-2023-44382

Disclosure Date: December 01, 2023 (last updated December 07, 2023)
October is a Content Management System (CMS) and web platform to assist with development workflow. An authenticated backend user with the `editor.cms_pages`, `editor.cms_layouts`, or `editor.cms_partials` permissions who would normally not be permitted to provide PHP code to be executed by the CMS due to `cms.safe_mode` being enabled can write specific Twig code to escape the Twig sandbox and execute arbitrary PHP. This issue has been patched in 3.4.15.
Attacker Value
Unknown

CVE-2023-44381

Disclosure Date: December 01, 2023 (last updated December 07, 2023)
October is a Content Management System (CMS) and web platform to assist with development workflow. An authenticated backend user with the `editor.cms_pages`, `editor.cms_layouts`, or `editor.cms_partials` permissions who would normally not be permitted to provide PHP code to be executed by the CMS due to `cms.safe_mode` being enabled can craft a special request to include PHP code in the CMS template. This issue has been patched in version 3.4.15.
Attacker Value
Unknown

CVE-2023-44383

Disclosure Date: November 29, 2023 (last updated December 06, 2023)
October is a Content Management System (CMS) and web platform to assist with development workflow. A user with access to the media manager that stores SVG files could create a stored XSS attack against themselves and any other user with access to the media manager when SVG files are supported. This issue has been patched in version 3.5.2.
Attacker Value
Unknown

CVE-2023-43876

Disclosure Date: September 28, 2023 (last updated October 08, 2023)
A Cross-Site Scripting (XSS) vulnerability in installation of October v.3.4.16 allows an attacker to execute arbitrary web scripts via a crafted payload injected into the dbhost field.
Attacker Value
Unknown

CVE-2023-37692

Disclosure Date: July 26, 2023 (last updated October 08, 2023)
An arbitrary file upload vulnerability in October CMS v3.4.4 allows attackers to execute arbitrary code via a crafted file.
Attacker Value
Unknown

CVE-2022-35944

Disclosure Date: October 13, 2022 (last updated October 08, 2023)
October is a self-hosted Content Management System (CMS) platform based on the Laravel PHP Framework. This vulnerability only affects installations that rely on the safe mode restriction, commonly used when providing public access to the admin panel. Assuming an attacker has access to the admin panel and permission to open the "Editor" section, they can bypass the Safe Mode (`cms.safe_mode`) restriction to introduce new PHP code in a CMS template using a specially crafted request. The issue has been patched in versions 2.2.34 and 3.0.66.