Vulnerabilities
Vulnerable Software
Textpattern:  >> Textpattern  Security Vulnerabilities
Textpattern 4.7.3 contains an aribtrary file load via the file_insert function in include/txp_file.php.
CVSS Score
9.8
EPSS Score
0.004
Published
2021-06-21
Textpattern V4.8.4 contains an arbitrary file upload vulnerability where a plug-in can be loaded in the background without any security verification, which may lead to obtaining system permissions.
CVSS Score
6.5
EPSS Score
0.001
Published
2021-04-15
Textpattern 4.8.4 is affected by cross-site scripting (XSS) in the Body parameter.
CVSS Score
4.8
EPSS Score
0.003
Published
2021-01-26
Textpattern CMS 4.6.2 allows CSRF via the prefs subsystem.
CVSS Score
8.8
EPSS Score
0.002
Published
2020-12-02
In Textpattern 4.5.7, the password-reset feature does not securely tether a hash to a user account.
CVSS Score
5.3
EPSS Score
0.002
Published
2020-08-14
In Textpattern 4.5.7, an unprivileged author can change an article's markup setting.
CVSS Score
5.3
EPSS Score
0.002
Published
2020-08-14
An issue was discovered in Textpattern CMS 4.6.2 and earlier. It is possible to inject SQL code in the variable "qty" on the page index.php.
CVSS Score
9.8
EPSS Score
0.179
Published
2018-03-14
textpattern version version 4.6.2 contains a XML Injection vulnerability in Import XML feature that can result in Denial of service in context to the web server by exhausting server memory resources. This attack appear to be exploitable via Uploading a specially crafted XML file.
CVSS Score
7.5
EPSS Score
0.002
Published
2018-03-13
Cross-site scripting (XSS) vulnerability in Textpattern CMS before 4.5.7 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to setup/index.php.
CVSS Score
4.3
EPSS Score
0.004
Published
2014-10-10
Cross-site scripting (XSS) vulnerability in setup/index.php in Textpattern CMS 4.4.1, when the product is incompletely installed, allows remote attackers to inject arbitrary web script or HTML via the ddb parameter.
CVSS Score
4.3
EPSS Score
0.022
Published
2012-01-05


Contact Us

Shodan ® - All rights reserved