CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
SQL Injection vulnerability in Subrion CMS v4.2.1 in the search page if a website uses a PDO connection. |
admin/blocks.php in Subrion CMS through 4.2.1 allows PHP Object Injection (with resultant file deletion) via serialized data in the subpages value within a block to blocks/edit. |
Subrion CMS 4.2.1 allows CSV injection via a phrase value within a language. This is related to phrases/add/ and languages/download/. |
Subrion CMS 4.2.1 allows session fixation via an alphanumeric value in a session cookie. |
Subrion CMS 4.2.1 has CSRF in panel/modules/plugins/. The attacker can remotely activate/deactivate the plugins. |
Subrion CMS v4.2.1 allows XSS via the panel/phrases/ VALUE parameter. |
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in Subrion CMS 4.2.1 that allows a remote attacker to remove files on the server without a victim's knowledge, by enticing an authenticated user to visit an attacker's web page. The application fails to validate the CSRF token for a GET request. An attacker can craft a panel/uploads/read.json?cmd=rm URL (removing this token) and send it to the victim. |
An XSS issue was identified on the Subrion CMS 4.2.1 /panel/configuration/general settings page. A remote attacker can inject arbitrary JavaScript code in the v[language_switch] parameter (within multipart/form-data), which is reflected back within a user's browser without proper output encoding. |
Subrion 4.2.1 allows XSS via the panel/members/ Username, Full Name, or Email field, aka an "Admin Member JSON Update" issue. |
Subrion CMS 4.2.1 allows _core/en/contacts/ XSS via the name, email, or phone parameter. |
Subrion CMS 4.1.5 (and possibly earlier versions) allow CSRF to change the administrator password via the panel/members/edit/1 URI. |
/panel/uploads in Subrion CMS 4.2.1 allows remote attackers to execute arbitrary PHP code via a .pht or .phar file, because the .htaccess file omits these. |
Subrion CMS v4.2.1 allows XSS via the panel/configuration/general/ SITE TITLE parameter. |
panel/uploads/#elf_l1_XA in Subrion CMS v4.2.1 allows XSS via an SVG file with JavaScript in a SCRIPT element. |
There is Stored XSS in Subrion 4.2.1 via the admin panel URL configuration. |
_core/admin/pages/add/ in Subrion CMS 4.2.1 has XSS via the titles[en] parameter. |
uploads/.htaccess in Subrion CMS 4.2.1 allows XSS because it does not block .html file uploads (but does block, for example, .htm file uploads). |
Subrion CMS before 4.1.4 has XSS. |
Subrion CMS 4.1.5 has CSRF in blog/delete/. |