Arbitrary code execution vulnerability in Kentico 9 through 11 allows remote authenticated users to execute arbitrary operating system commands in a dynamic .NET code evaluation context via C# code in a "Pages -> Edit -> Template -> Edit template properties -> Layout" box. NOTE: the vendor has responded that there is intended functionality for authorized users to edit and update ascx code layout
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| http://www.securityfocus.com/archive/1/541790/100/0/threaded |
|
History
Fri, 19 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Kentico xperience
|
|
| CPEs | cpe:2.3:a:kentico:xperience:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Kentico kentico Cms
|
Kentico xperience
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T06:17:17.427Z
Reserved: 2018-02-14T00:00:00
Link: CVE-2018-7046
No data.
Status : Modified
Published: 2018-02-20T15:29:00.617
Modified: 2025-12-19T20:56:46.070
Link: CVE-2018-7046
No data.
OpenCVE Enrichment
No data.
Weaknesses