Filtered by vendor Statamic
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-45364 | 1 Statamic | 1 Statamic | 2022-04-18 | 7.5 HIGH | 9.8 CRITICAL |
** DISPUTED ** A Code Execution vulnerability exists in Statamic Version through 3.2.26 via SettingsController.php. NOTE: the vendor indicates that there was an error in publishing this CVE Record, and that all parties agree that the affected code was not used in any Statamic product. | |||||
CVE-2022-24784 | 1 Statamic | 1 Statamic | 2022-03-31 | 4.3 MEDIUM | 3.7 LOW |
Statamic is a Laravel and Git powered CMS. Before versions 3.2.39 and 3.3.2, it is possible to confirm a single character of a user's password hash using a specially crafted regular expression filter in the users endpoint of the REST API. Multiple such requests can eventually uncover the entire hash. The hash is not present in the response, however the presence or absence of a result confirms if the character is in the right position. The API has throttling enabled by default, making this a time intensive task. Both the REST API and the users endpoint need to be enabled, as they are disabled by default. The issue has been fixed in versions 3.2.39 and above, and 3.3.2 and above. | |||||
CVE-2017-11422 | 1 Statamic | 1 Statamic | 2020-12-10 | 6.5 MEDIUM | 8.8 HIGH |
Statamic framework before 2.6.0 does not correctly check a session's permissions when the methods from a user's class are called. Problematic methods include reset password, create new account, create new role, etc. | |||||
CVE-2018-19598 | 1 Statamic | 1 Statamic | 2019-02-26 | 3.5 LOW | 4.8 MEDIUM |
Statamic 2.10.3 allows XSS via First Name or Last Name to the /users URI in an 'Add new user' request. |