Packagist (Composer) package
redaxo/source
pkg:composer/redaxo/source
Vulnerabilities (11)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-21857 | — | < 5.20.2 | 5.20.2 | Jan 7, 2026 | REDAXO is a PHP-based content management system. Prior to version 5.20.2, authenticated users with backup permissions can read arbitrary files within the webroot via path traversal in the Backup addon's file export functionality. The Backup addon does not validate the `EXPDIR` PO | ||
| CVE-2025-66026 | — | < 5.20.1 | 5.20.1 | Nov 26, 2025 | REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the b | ||
| CVE-2025-64050 | — | < 5.20.1 | 5.20.1 | Nov 25, 2025 | A Remote Code Execution (RCE) vulnerability in the template management component in REDAXO CMS 5.20.0 allows remote authenticated administrators to execute arbitrary operating system commands by injecting PHP code into an active template. The payload is executed when visitors acc | ||
| CVE-2025-64049 | — | < 5.20.1 | 5.20.1 | Nov 25, 2025 | A stored cross-site scripting (XSS) vulnerability in the module management component in REDAXO CMS 5.20.0 allows remote users to inject arbitrary web script or HTML via the Output code field in modules. The payload is executed when a user views or edits an article by adding slice | ||
| CVE-2025-27412 | — | >= 5.0.0, < 5.18.3 | 5.18.3 | Mar 5, 2025 | REDAXO is a PHP-based CMS. In Redaxo from 5.0.0 through 5.18.2, the rex-api-result parameter is vulnerable to Reflected cross-site scripting (XSS) on the page of AddOns. This vulnerability is fixed in 5.18.3. | ||
| CVE-2025-27411 | — | < 5.18.3 | 5.18.3 | Mar 5, 2025 | REDAXO is a PHP-based CMS. In Redaxo before 5.18.3, the mediapool/media page is vulnerable to arbitrary file upload. This vulnerability is fixed in 5.18.3. | ||
| CVE-2024-13209 | — | >= 5.12.0-beta1, < 5.18.2 | 5.18.2 | Jan 9, 2025 | A vulnerability was found in Redaxo CMS 5.18.1. It has been classified as problematic. Affected is an unknown function of the file /index.php?page=structure&category_id=1&article_id=1&clang=1&function=edit_art&artstart=0 of the component Structure Management Page. The manipulatio | ||
| CVE-2024-46209 | — | <= 5.17.1 | — | Jan 6, 2025 | A stored cross-site scripting (XSS) vulnerability in the component /media/test.html of REDAXO CMS v5.17.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the password parameter. | ||
| CVE-2024-50803 | — | < 5.18.0 | 5.18.0 | Nov 19, 2024 | The mediapool feature of the Redaxo Core CMS application v 5.17.1 is vulnerable to Cross Site Scripting(XSS) which allows a remote attacker to escalate privileges | ||
| CVE-2024-46212 | — | <= 5.17.1 | — | Oct 16, 2024 | An issue in the component /index.php?page=backup/export of REDAXO CMS v5.17.1 allows attackers to execute a directory traversal. | ||
| CVE-2024-25298 | — | <= 5.15.1 | — | Feb 17, 2024 | An issue was discovered in REDAXO version 5.15.1, allows attackers to execute arbitrary code and obtain sensitive information via modules.modules.php. |
- CVE-2026-21857Jan 7, 2026affected < 5.20.2fixed 5.20.2
REDAXO is a PHP-based content management system. Prior to version 5.20.2, authenticated users with backup permissions can read arbitrary files within the webroot via path traversal in the Backup addon's file export functionality. The Backup addon does not validate the `EXPDIR` PO
- CVE-2025-66026Nov 26, 2025affected < 5.20.1fixed 5.20.1
REDAXO is a PHP-based CMS. Prior to version 5.20.1, a reflected Cross-Site Scripting (XSS) vulnerability exists in the Mediapool view where the request parameter args[types] is rendered into an info banner without HTML-escaping. This allows arbitrary JavaScript execution in the b
- CVE-2025-64050Nov 25, 2025affected < 5.20.1fixed 5.20.1
A Remote Code Execution (RCE) vulnerability in the template management component in REDAXO CMS 5.20.0 allows remote authenticated administrators to execute arbitrary operating system commands by injecting PHP code into an active template. The payload is executed when visitors acc
- CVE-2025-64049Nov 25, 2025affected < 5.20.1fixed 5.20.1
A stored cross-site scripting (XSS) vulnerability in the module management component in REDAXO CMS 5.20.0 allows remote users to inject arbitrary web script or HTML via the Output code field in modules. The payload is executed when a user views or edits an article by adding slice
- CVE-2025-27412Mar 5, 2025affected >= 5.0.0, < 5.18.3fixed 5.18.3
REDAXO is a PHP-based CMS. In Redaxo from 5.0.0 through 5.18.2, the rex-api-result parameter is vulnerable to Reflected cross-site scripting (XSS) on the page of AddOns. This vulnerability is fixed in 5.18.3.
- CVE-2025-27411Mar 5, 2025affected < 5.18.3fixed 5.18.3
REDAXO is a PHP-based CMS. In Redaxo before 5.18.3, the mediapool/media page is vulnerable to arbitrary file upload. This vulnerability is fixed in 5.18.3.
- CVE-2024-13209Jan 9, 2025affected >= 5.12.0-beta1, < 5.18.2fixed 5.18.2
A vulnerability was found in Redaxo CMS 5.18.1. It has been classified as problematic. Affected is an unknown function of the file /index.php?page=structure&category_id=1&article_id=1&clang=1&function=edit_art&artstart=0 of the component Structure Management Page. The manipulatio
- CVE-2024-46209Jan 6, 2025affected <= 5.17.1
A stored cross-site scripting (XSS) vulnerability in the component /media/test.html of REDAXO CMS v5.17.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the password parameter.
- CVE-2024-50803Nov 19, 2024affected < 5.18.0fixed 5.18.0
The mediapool feature of the Redaxo Core CMS application v 5.17.1 is vulnerable to Cross Site Scripting(XSS) which allows a remote attacker to escalate privileges
- CVE-2024-46212Oct 16, 2024affected <= 5.17.1
An issue in the component /index.php?page=backup/export of REDAXO CMS v5.17.1 allows attackers to execute a directory traversal.
- CVE-2024-25298Feb 17, 2024affected <= 5.15.1
An issue was discovered in REDAXO version 5.15.1, allows attackers to execute arbitrary code and obtain sensitive information via modules.modules.php.