VYPR

Packagist (Composer) package

baserproject/basercms

pkg:composer/baserproject/basercms

Vulnerabilities (56)

  • CVE-2023-29009Oct 27, 2023
    affected < 4.8.0fixed 4.8.0

    baserCMS is a website development framework with WebAPI that runs on PHP8 and CakePHP4. There is a XSS Vulnerability in Favorites Feature to baserCMS. This issue has been patched in version 4.8.0.

  • CVE-2023-25655Mar 23, 2023
    affected < 4.7.5fixed 4.7.5

    baserCMS is a Content Management system. Prior to version 4.7.5, any file may be uploaded on the management system of baserCMS. Version 4.7.5 contains a patch.

  • CVE-2023-25654Mar 23, 2023
    affected < 4.7.5fixed 4.7.5

    baserCMS is a Content Management system. Prior to version 4.7.5, there is a Remote Code Execution (RCE) Vulnerability in the management system of baserCMS. Version 4.7.5 contains a patch.

  • CVE-2022-42486Dec 7, 2022
    affected < 4.7.2fixed 4.7.2

    Stored cross-site scripting vulnerability in User group management of baserCMS versions prior to 4.7.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script.

  • CVE-2022-41994Dec 7, 2022
    affected < 4.7.2fixed 4.7.2

    Stored cross-site scripting vulnerability in Permission Settings of baserCMS versions prior to 4.7.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script.

  • CVE-2022-39325Nov 25, 2022
    affected < 4.7.2fixed 4.7.2

    BaserCMS is a content management system with a japanese language focus. In affected versions there is a cross-site scripting vulnerability on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified

  • CVE-2021-41279Nov 26, 2021
    affected < 4.5.4fixed 4.5.4

    BaserCMS is an open source content management system with a focus on Japanese language support. In affected versions users with upload privilege may upload crafted zip files capable of path traversal on the host operating system. This is a vulnerability that needs to be addressed

  • CVE-2021-41243Nov 26, 2021
    affected < 4.5.4fixed 4.5.4

    There is a Potential Zip Slip Vulnerability and OS Command Injection Vulnerability on the management system of baserCMS. Users with permissions to upload files may upload crafted zip files which may execute arbitrary commands on the host operating system. This is a vulnerability

  • CVE-2021-39136Aug 25, 2021
    affected < 4.5.1fixed 4.5.1

    baserCMS is an open source content management system with a focus on Japanese language support. In affected versions there is a cross-site scripting vulnerability in the file upload function of the management system of baserCMS. Users are advised to update as soon as possible. No

  • CVE-2021-20683Mar 26, 2021
    affected < 4.4.5fixed 4.4.5

    Improper neutralization of JavaScript input in the blog article editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.

  • CVE-2021-20682Mar 26, 2021
    affected < 4.4.5fixed 4.4.5

    baserCMS versions prior to 4.4.5 allows a remote attacker with an administrative privilege to execute arbitrary OS commands via unspecified vectors.

  • CVE-2021-20681Mar 26, 2021
    affected < 4.4.5fixed 4.4.5

    Improper neutralization of JavaScript input in the page editing function of baserCMS versions prior to 4.4.5 allows remote authenticated attackers to inject an arbitrary script via unspecified vectors.

  • CVE-2020-15273Oct 30, 2020
    affected >= 4.4.0, < 4.4.1fixed 4.4.1

    baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. The issue affects the following components: Edit feed settings, Edit widget area, Sub site new registration, New category registration. Arbitrary JavaScript may be executed by entering specific characters in the

  • CVE-2020-15276Oct 30, 2020
    affected >= 4.4.0, < 4.4.1fixed 4.4.1

    baserCMS before version 4.4.1 is vulnerable to Cross-Site Scripting. Arbitrary JavaScript may be executed by entering a crafted nickname in blog comments. The issue affects the blog comment component. It is fixed in version 4.4.1.

  • CVE-2020-15277Oct 30, 2020
    affected >= 4.4.0, < 4.4.1fixed 4.4.1

    baserCMS before version 4.4.1 is affected by Remote Code Execution (RCE). Code may be executed by logging in as a system administrator and uploading an executable script file such as a PHP file. The Edit template component is vulnerable. The issue is fixed in version 4.4.1.

  • CVE-2020-15159Aug 28, 2020
    affected >= 4.0.0, < 4.3.7fixed 4.3.7

    baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) and Remote Code Execution (RCE). This may be executed by logging in as a system administrator and uploading an executable script file such as a PHP file.The affected components are ThemeFilesController.php and U

  • CVE-2020-15155Aug 28, 2020
    affected >= 4.0.0, < 4.3.7fixed 4.3.7

    baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components is toolbar.php. The issue is fixed in version 4.3.7.

  • CVE-2020-15154Aug 28, 2020
    affected >= 4.0.0, < 4.3.7fixed 4.3.7

    baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components are: content_fields.php, content_info.php, content_options.php, content_related.php, index_list_tre

  • CVE-2018-18943Nov 5, 2018
    affected < 4.1.4fixed 4.1.4

    An issue was discovered in baserCMS before 4.1.4. In the Register New Category feature of the Upload menu, the category name can be used for XSS via the data[UploaderCategory][name] parameter to an admin/uploader/uploader_categories/edit URI.

  • CVE-2018-18942Nov 5, 2018
    affected < 4.1.4fixed 4.1.4

    In baserCMS before 4.1.4, lib\Baser\Model\ThemeConfig.php allows remote attackers to execute arbitrary PHP code via the admin/theme_configs/form data[ThemeConfig][logo] parameter.