Vulnerabilities
Vulnerable Software
Limesurvey:  Security Vulnerabilities
In Limesurvey before 3.17.14, admin users can view, update, or delete reserved menu entries without proper permissions.
CVSS Score
7.2
EPSS Score
0.003
Published
2019-09-09
LimeSurvey before v3.17.14 allows stored XSS for escalating privileges from a low-privileged account to, for example, SuperAdmin. The attack uses a survey group in which the title contains JavaScript that is mishandled upon group deletion.
CVSS Score
5.4
EPSS Score
0.014
Published
2019-09-09
LimeSurvey before v3.17.14 allows reflected XSS for escalating privileges from a low-privileged account to, for example, SuperAdmin. This occurs in application/core/Survey_Common_Action.php,
CVSS Score
5.4
EPSS Score
0.005
Published
2019-09-09
Limesurvey before 3.17.10 does not validate both the MIME type and file extension of an image.
CVSS Score
7.5
EPSS Score
0.002
Published
2019-08-26
The downloadZip function in application/controllers/admin/export.php in LimeSurvey through 3.16.1+190225 allows a relative path.
CVSS Score
9.8
EPSS Score
0.701
Published
2019-03-24
LimeSurvey before 2.72.4 has Stored XSS by using the Continue Later (aka Resume later) feature to enter an email address, which is mishandled in the admin panel.
CVSS Score
6.1
EPSS Score
0.003
Published
2019-01-15
LimeSurvey version 3.15.5 contains a Cross-site scripting (XSS) vulnerability in Survey Resource zip upload, resulting in Javascript code execution against LimeSurvey administrators. Fixed in version 3.15.6.
CVSS Score
6.1
EPSS Score
0.004
Published
2018-12-21
In LimeSurvey 3.14.7, HTML Injection and Stored XSS have been discovered in the appendix via the surveyls_title parameter to /index.php?r=admin/survey/sa/insert.
CVSS Score
6.1
EPSS Score
0.002
Published
2018-09-21
An issue was discovered in TCPDF before 6.2.22. Attackers can trigger deserialization of arbitrary data via the phar:// wrapper.
CVSS Score
9.8
EPSS Score
0.594
Published
2018-09-14
LimeSurvey version prior to 3.14.4 contains a file upload vulnerability in upload functionality that can result in an attacker gaining code execution via webshell. This attack appear to be exploitable via an authenticated user uploading a zip archive which can contains malicious php files that can be called under certain circumstances. This vulnerability appears to have been fixed in after commit 91d143230eb357260a19c8424b3005deb49a47f7 / version 3.14.4.
CVSS Score
8.8
EPSS Score
0.007
Published
2018-09-06


Contact Us

Shodan ® - All rights reserved