VYPR
High severity8.1NVD Advisory· Published Mar 30, 2017· Updated May 13, 2026

CVE-2017-7323

CVE-2017-7323

Description

The (1) update and (2) package-installation features in MODX Revolution 2.5.4-pl and earlier use http://rest.modx.com by default, which allows man-in-the-middle attackers to spoof servers and trigger the execution of arbitrary code by leveraging the lack of the HTTPS protection mechanism.

Affected products

1
  • cpe:2.3:a:modx:modx_revolution:*:*:*:*:*:*:*:*
    Range: <=2.5.4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.