Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Cmsmadesimple Subscribe
Total 134 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-17226 1 Cmsmadesimple 1 Cms Made Simple 2019-10-08 3.5 LOW 4.8 MEDIUM
CMS Made Simple (CMSMS) 2.2.11 allows XSS via the Site Admin > Module Manager > Search Term field.
CVE-2018-10086 1 Cmsmadesimple 1 Cms Made Simple 2019-10-02 6.5 MEDIUM 7.2 HIGH
CMS Made Simple (CMSMS) through 2.2.7 contains an arbitrary code execution vulnerability in the admin dashboard because the implementation uses "eval('function testfunction'.rand()" and it is possible to bypass certain restrictions on these "testfunction" functions.
CVE-2018-1000158 1 Cmsmadesimple 1 Cms Made Simple 2019-10-02 4.3 MEDIUM 8.8 HIGH
cmsmadesimple version 2.2.7 contains a Incorrect Access Control vulnerability in the function of send_recovery_email in the line "$url = $config['admin_url'] . '/login.php?recoverme=' . $code;" that can result in Administrator Password Reset Poisoning, specifically a reset URL pointing at an attacker controlled server can be created by using a host header attack.
CVE-2018-10084 1 Cmsmadesimple 1 Cms Made Simple 2019-10-02 6.5 MEDIUM 8.8 HIGH
CMS Made Simple (CMSMS) through 2.2.6 contains a privilege escalation vulnerability from ordinary user to admin user by arranging for the eff_uid value within $_COOKIE[$this->_loginkey] to equal 1, because an SHA-1 cryptographic protection mechanism can be bypassed.
CVE-2018-10518 1 Cmsmadesimple 1 Cms Made Simple 2019-10-02 8.5 HIGH 6.5 MEDIUM
In CMS Made Simple (CMSMS) through 2.2.7, the "file delete" operation in the admin dashboard contains an arbitrary file deletion vulnerability that can cause DoS, exploitable by an admin user, because the attacker can remove all lib/ files in all directories.
CVE-2018-10520 1 Cmsmadesimple 1 Cms Made Simple 2019-10-02 8.5 HIGH 6.5 MEDIUM
In CMS Made Simple (CMSMS) through 2.2.7, the "module remove" operation in the admin dashboard contains an arbitrary file deletion vulnerability that can cause DoS, exploitable by an admin user, because the attacker can remove all lib/ files in all directories.
CVE-2017-11405 1 Cmsmadesimple 1 Cms Made Simple 2019-10-02 4.0 MEDIUM 4.9 MEDIUM
In CMS Made Simple (CMSMS) 2.2.2, remote authenticated administrators can upload a .php file via a CMSContentManager action to admin/moduleinterface.php, followed by a FilePicker action to admin/moduleinterface.php in which type=image is changed to type=file.
CVE-2017-11404 1 Cmsmadesimple 1 Cms Made Simple 2019-10-02 4.0 MEDIUM 4.9 MEDIUM
In CMS Made Simple (CMSMS) 2.2.2, remote authenticated administrators can upload a .php file via a FileManager action to admin/moduleinterface.php.
CVE-2018-10519 1 Cmsmadesimple 1 Cms Made Simple 2019-10-02 6.5 MEDIUM 8.8 HIGH
CMS Made Simple (CMSMS) 2.2.7 contains a privilege escalation vulnerability from ordinary user to admin user by arranging for the eff_uid value within $_COOKIE[$this->_loginkey] to equal 1, because files in the tmp/ directory are accessible through HTTP requests. NOTE: this vulnerability exists because of an incorrect fix for CVE-2018-10084.
CVE-2019-1010290 1 Cmsmadesimple 1 Bable\ 2019-07-19 5.8 MEDIUM 6.1 MEDIUM
Babel: Multilingual site Babel All is affected by: Open Redirection. The impact is: Redirection to any URL, which is supplied to redirect.php in a "newurl" parameter. The component is: redirect.php. The attack vector is: The victim must open a link created by an attacker. Attacker may use any legitimate site using Babel to redirect user to a URL of his/her choosing.
CVE-2019-10017 1 Cmsmadesimple 1 Cms Made Simple 2019-07-18 3.5 LOW 5.4 MEDIUM
CMS Made Simple 2.2.10 has XSS via the moduleinterface.php Name field, which is reachable via an "Add a new Profile" action to the File Picker.
CVE-2019-11226 1 Cmsmadesimple 1 Cms Made Simple 2019-06-05 3.5 LOW 5.4 MEDIUM
CMS Made Simple 2.2.10 has XSS via the m1_name parameter in "Add Article" under Content -> Content Manager -> News.
CVE-2019-11513 1 Cmsmadesimple 1 Cms Made Simple 2019-04-26 3.5 LOW 4.8 MEDIUM
The File Manager in CMS Made Simple through 2.2.10 has Reflected XSS via the "New name" field in a Rename action.
CVE-2019-9053 1 Cmsmadesimple 1 Cms Made Simple 2019-04-24 6.8 MEDIUM 8.1 HIGH
An issue was discovered in CMS Made Simple 2.2.8. It is possible with the News module, through a crafted URL, to achieve unauthenticated blind time-based SQL injection via the m1_idlist parameter.
CVE-2019-9692 1 Cmsmadesimple 1 Cms Made Simple 2019-04-02 4.0 MEDIUM 6.5 MEDIUM
class.showtime2_image.php in CMS Made Simple (CMSMS) before 2.2.10 does not ensure that a watermark file has a standard image file extension (GIF, JPG, JPEG, or PNG).
CVE-2019-10105 1 Cmsmadesimple 1 Cms Made Simple 2019-03-27 3.5 LOW 5.4 MEDIUM
CMS Made Simple 2.2.10 has a Self-XSS vulnerability via the Layout Design Manager "Name" field, which is reachable via a "Create a new Template" action to the Design Manager.
CVE-2019-10107 1 Cmsmadesimple 1 Cms Made Simple 2019-03-27 3.5 LOW 5.4 MEDIUM
CMS Made Simple 2.2.10 has XSS via the myaccount.php "Email Address" field, which is reachable via the "My Preferences -> My Account" section.
CVE-2019-10106 1 Cmsmadesimple 1 Cms Made Simple 2019-03-27 3.5 LOW 5.4 MEDIUM
CMS Made Simple 2.2.10 has XSS via the 'moduleinterface.php' Name field, which is reachable via an "Add Category" action to the "Site Admin Settings - News module" section.
CVE-2019-9059 1 Cmsmadesimple 1 Cms Made Simple 2019-03-26 6.5 MEDIUM 7.2 HIGH
An issue was discovered in CMS Made Simple 2.2.8. It is possible, with an administrator account, to achieve command injection by modifying the path of the e-mail executable in Mail Settings, setting "sendmail" in the "Mailer" option, and launching the "Forgot your password" feature.
CVE-2018-1000094 1 Cmsmadesimple 1 Cms Made Simple 2019-03-19 6.5 MEDIUM 7.2 HIGH
CMS Made Simple version 2.2.5 contains a Remote Code Execution vulnerability in File Manager that can result in Allows an authenticated admin that has access to the file manager to execute code on the server. This attack appear to be exploitable via File upload -> copy to any extension.