Summary
Detail | |||
---|---|---|---|
Vendor | Pagekit | First view | 2017-01-25 |
Product | Pagekit | Last view | 2024-10-01 |
Version | Type | Application | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:pagekit:pagekit:1.0.18:*:*:*:*:*:*:* | 6 |
cpe:2.3:a:pagekit:pagekit:*:*:*:*:*:*:*:* | 4 |
cpe:2.3:a:pagekit:pagekit:1.0.17:*:*:*:*:*:*:* | 3 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
0 | 2024-10-01 | CVE-2024-45967 | Pagekit 1.0.18 is vulnerable to Cross Site Scripting (XSS) in index.php/admin/site/widget. |
7.8 | 2023-08-28 | CVE-2023-41005 | An issue in Pagekit pagekit v.1.0.18 alows a remote attacker to execute arbitrary code via thedownloadAction and updateAction functions in UpdateController.php |
9.8 | 2022-09-20 | CVE-2022-38916 | A file upload vulnerability exists in the storage feature of pagekit 1.0.18, which allows an attacker to upload malicious files |
6.1 | 2022-08-29 | CVE-2022-36573 | A cross-site scripting (XSS) vulnerability in Pagekit CMS v1.0.18 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Markdown text box under /blog/post/edit. |
9.8 | 2022-04-01 | CVE-2021-44135 | pagekit all versions, as of 15-10-2021, is vulnerable to SQL Injection via Comment listing. |
5.4 | 2021-06-16 | CVE-2021-32245 | In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack. |
8.8 | 2019-11-22 | CVE-2019-19013 | A CSRF vulnerability in Pagekit 1.0.17 allows an attacker to upload an arbitrary file by removing the CSRF token from a request. |
5.3 | 2019-09-21 | CVE-2019-16669 | The Reset Password feature in Pagekit 1.0.17 gives a different response depending on whether the e-mail address of a valid user account is entered, which might make it easier for attackers to enumerate accounts. |
6.1 | 2018-07-18 | CVE-2018-14381 | Pagekit before 1.0.14 has a /user/login?redirect= open redirect vulnerability. |
4.8 | 2018-06-01 | CVE-2018-11564 | Stored XSS in YOOtheme Pagekit 1.0.13 and earlier allows a user to upload malicious code via the picture upload feature. A user with elevated privileges could upload a photo to the system in an SVG format. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/poc.svg" that will point to http://localhost/pagekit/storage/poc.svg. When a user comes along to click that link, it will trigger a XSS attack. |
7.5 | 2017-01-25 | CVE-2017-5594 | An issue was discovered in Pagekit CMS before 1.0.11. In this vulnerability the remote attacker is able to reset the registered user's password, when the debug toolbar is enabled. The password is successfully recovered using this exploit. The SecureLayer7 ID is SL7_PGKT_01. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (3) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
11% (1) | CWE-640 | Weak Password Recovery Mechanism for Forgotten Password |
11% (1) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
11% (1) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
11% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
11% (1) | CWE-203 | Information Exposure Through Discrepancy |
11% (1) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |