High severity8.1NVD Advisory· Published Mar 30, 2017· Updated May 13, 2026
CVE-2017-7323
CVE-2017-7323
Description
The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- mazinahmed.net/services/public-reports/ModX%20-%20Responsible%20Disclosure%20-%20January%202017.pdfnvdExploitTechnical DescriptionThird Party Advisory
- www.securityfocus.com/bid/97228nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.