Vulnerabilities
Vulnerable Software
Pimcore:  >> Pimcore  >> 1.5.17  Security Vulnerabilities
Pimcore is an open source data and experience management platform. Prior to version 10.5.19, an attacker can use cross-site scripting to send a malicious script to an unsuspecting user. Users may upgrade to version 10.5.19 to receive a patch or, as a workaround, apply the patch manually.
CVSS Score
6.1
EPSS Score
0.001
Published
2023-03-16
Pimcore is an open source data and experience management platform. Prior to version 10.5.19, quoting is not done properly in UUID DAO model. There is the theoretical possibility to inject custom SQL if the developer is using this methods with input data and not doing proper input validation in advance and so relies on the auto-quoting being done by the DAO class. Users should update to version 10.5.19 to receive a patch or, as a workaround, apply the patch manually.
CVSS Score
7.9
EPSS Score
0.0
Published
2023-03-16
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.19.
CVSS Score
4.0
EPSS Score
0.0
Published
2023-03-16
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.19.
CVSS Score
5.2
EPSS Score
0.0
Published
2023-03-10
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.19.
CVSS Score
4.8
EPSS Score
0.0
Published
2023-03-09
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18.
CVSS Score
7.6
EPSS Score
0.0
Published
2023-03-01
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18.
CVSS Score
5.4
EPSS Score
0.0
Published
2023-03-01
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18.
CVSS Score
4.8
EPSS Score
0.0
Published
2023-03-01
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18.
CVSS Score
5.2
EPSS Score
0.0
Published
2023-02-27
Pimcore is an Open Source Data & Experience Management Platform: PIM, MDM, CDP, DAM, DXP/CMS & Digital Commerce. The upload functionality for updating user profile does not properly validate the file content-type, allowing any authenticated user to bypass this security check by adding a valid signature (p.e. GIF89) and sending any invalid content-type. This could allow an authenticated attacker to upload HTML files with JS content that will be executed in the context of the domain. This issue has been patched in version 10.5.16.
CVSS Score
8.2
EPSS Score
0.0
Published
2023-02-03


Contact Us

Shodan ® - All rights reserved