Packagist (Composer) package
modx/revolution
pkg:composer/modx/revolution
Vulnerabilities (14)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-28010 | — | <= 3.1.0 | — | Mar 13, 2025 | A cross-site scripting (XSS) vulnerability has been identified in MODX prior to 3.1.0. The vulnerability allows authenticated users to upload SVG files containing malicious JavaScript code as profile images, which gets executed in victims' browsers when viewing the profile image. | ||
| CVE-2022-26149 | — | <= 2.8.3-pl | — | Feb 26, 2022 | MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator. | ||
| CVE-2020-25911 | — | < 2.8.0 | 2.8.0 | Oct 31, 2021 | A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS). | ||
| CVE-2018-20758 | — | < 2.7.1-pl | 2.7.1-pl | Feb 6, 2019 | MODX Revolution through v2.7.0-pl allows XSS via User Settings such as Description. | ||
| CVE-2018-20757 | — | < 2.7.1-pl | 2.7.1-pl | Feb 6, 2019 | MODX Revolution through v2.7.0-pl allows XSS via an extended user field such as Container name or Attribute name. | ||
| CVE-2018-20756 | — | < 2.7.1-pl | 2.7.1-pl | Feb 6, 2019 | MODX Revolution through v2.7.0-pl allows XSS via a document resource (such as pagetitle), which is mishandled during an Update action, a Quick Edit action, or the viewing of manager logs. | ||
| CVE-2018-20755 | — | < 2.7.1-pl | 2.7.1-pl | Feb 6, 2019 | MODX Revolution through v2.7.0-pl allows XSS via the User Photo field. | ||
| CVE-2018-1000207 | — | < 2.7.0 | 2.7.0 | Jul 13, 2018 | MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This v | ||
| CVE-2017-1000067 | Hig | 8.8 | >= 2.0.0, < 2.6.0 | 2.6.0 | Jul 17, 2017 | MODX Revolution version 2.x - 2.5.6 is vulnerable to blind SQL injection caused by improper sanitization by the escape method resulting in authenticated user accessing database and possibly escalating privileges. | |
| CVE-2017-9071 | Med | 4.7 | < 2.5.7 | 2.5.7 | May 18, 2017 | In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning. | |
| CVE-2017-9070 | Med | 5.4 | < 2.5.7 | 2.5.7 | May 18, 2017 | In MODX Revolution before 2.5.7, a user with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to connectors/index.php. | |
| CVE-2017-9069 | Hig | 8.8 | < 2.5.7 | 2.5.7 | May 18, 2017 | In MODX Revolution before 2.5.7, a user with file upload permissions is able to execute arbitrary code by uploading a file with the name .htaccess. | |
| CVE-2017-9068 | Med | 6.1 | < 2.5.7 | 2.5.7 | May 18, 2017 | In MODX Revolution before 2.5.7, an attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter. | |
| CVE-2017-9067 | Hig | 7.0 | < 2.5.7 | 2.5.7 | May 18, 2017 | In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal. |
- CVE-2025-28010Mar 13, 2025affected <= 3.1.0
A cross-site scripting (XSS) vulnerability has been identified in MODX prior to 3.1.0. The vulnerability allows authenticated users to upload SVG files containing malicious JavaScript code as profile images, which gets executed in victims' browsers when viewing the profile image.
- CVE-2022-26149Feb 26, 2022affected <= 2.8.3-pl
MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.
- CVE-2020-25911Oct 31, 2021affected < 2.8.0fixed 2.8.0
A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).
- CVE-2018-20758Feb 6, 2019affected < 2.7.1-plfixed 2.7.1-pl
MODX Revolution through v2.7.0-pl allows XSS via User Settings such as Description.
- CVE-2018-20757Feb 6, 2019affected < 2.7.1-plfixed 2.7.1-pl
MODX Revolution through v2.7.0-pl allows XSS via an extended user field such as Container name or Attribute name.
- CVE-2018-20756Feb 6, 2019affected < 2.7.1-plfixed 2.7.1-pl
MODX Revolution through v2.7.0-pl allows XSS via a document resource (such as pagetitle), which is mishandled during an Update action, a Quick Edit action, or the viewing of manager logs.
- CVE-2018-20755Feb 6, 2019affected < 2.7.1-plfixed 2.7.1-pl
MODX Revolution through v2.7.0-pl allows XSS via the User Photo field.
- CVE-2018-1000207Jul 13, 2018affected < 2.7.0fixed 2.7.0
MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This v
- affected >= 2.0.0, < 2.6.0fixed 2.6.0
MODX Revolution version 2.x - 2.5.6 is vulnerable to blind SQL injection caused by improper sanitization by the escape method resulting in authenticated user accessing database and possibly escalating privileges.
- affected < 2.5.7fixed 2.5.7
In MODX Revolution before 2.5.7, an attacker might be able to trigger XSS by injecting a payload into the HTTP Host header of a request. This is exploitable only in conjunction with other issues such as Cache Poisoning.
- affected < 2.5.7fixed 2.5.7
In MODX Revolution before 2.5.7, a user with resource edit permissions can inject an XSS payload into the title of any post via the pagetitle parameter to connectors/index.php.
- affected < 2.5.7fixed 2.5.7
In MODX Revolution before 2.5.7, a user with file upload permissions is able to execute arbitrary code by uploading a file with the name .htaccess.
- affected < 2.5.7fixed 2.5.7
In MODX Revolution before 2.5.7, an attacker is able to trigger Reflected XSS by injecting payloads into several fields on the setup page, as demonstrated by the database_type parameter.
- affected < 2.5.7fixed 2.5.7
In MODX Revolution before 2.5.7, when PHP 5.3.3 is used, an attacker is able to include and execute arbitrary files on the web server due to insufficient validation of the action parameter to setup/index.php, aka directory traversal.