CVE-2019-13237
Description
In Alkacon OpenCms 10.5.4 and 10.5.5, there are multiple resources vulnerable to Local File Inclusion that allow an attacker to access server resources: clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2019-13237 describes multiple Local File Inclusion vulnerabilities in Alkacon OpenCms 10.5.4 and 10.5.5, allowing unauthenticated attackers to read arbitrary server files.
Vulnerability
Description
CVE-2019-13237 is a Local File Inclusion (LFI) vulnerability affecting Alkacon OpenCms versions 10.5.4 and 10.5.5 [2]. The issue resides in multiple JSP and resource files, including clearhistory.jsp, convertxml.jsp, group_new.jsp, loginmessage.jsp, xmlcontentrepair.jsp, and /system/workplace/admin/history/settings/index.jsp [1][2]. These files fail to properly sanitize user-supplied input, allowing an attacker to include and read arbitrary files from the server's filesystem [1].
Exploitation
An attacker can exploit this vulnerability by sending crafted HTTP requests to the vulnerable resources. No authentication is required to access these endpoints [2]. The attack can be launched remotely over the network. By manipulating parameters such as file paths, the attacker can force the application to include files like /etc/passwd or configuration files containing sensitive data [1].
Impact
Successful exploitation allows an attacker to read local files on the server, including application source code, configuration files containing credentials or database connection strings, and potentially sensitive operating system files [1][2]. This can lead to further compromise of the system. The vulnerability provides a high impact on confidentiality, as the attacker gains access to system and application files [2].
Mitigation
As of the publication date, patches have been released in a more recent version of OpenCms [4]. Users are strongly advised to upgrade to a patched version of OpenCms immediately. If upgrading is not possible, access to the vulnerable JSP resources should be restricted through web server configuration or by removing the affected files, though this may impact application functionality [1].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.opencms:opencms-coreMaven | < 11.0.1 | 11.0.1 |
Affected products
2- Alkacon/OpenCmsdescription
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-36hf-6hp2-9g4cghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2019-13237ghsaADVISORY
- packetstormsecurity.com/files/154281/Alkacon-OpenCMS-10.5.x-Local-File-Inclusion.htmlghsax_refsource_MISCWEB
- aetsu.github.io/OpenCmsghsax_refsource_MISCWEB
- github.com/alkacon/opencms-core/commits/branch_10_5_xghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.