7 results (0.005 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

A vulnerability classified as problematic has been found in Bolt CMS 3.7.1. Affected is an unknown function of the file /bolt/editcontent/showcases of the component Showcase Creation Handler. The manipulation of the argument textarea leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. • https://vuldb.com/?ctiid.273168 https://vuldb.com/?id.273168 https://vuldb.com/?submit.380678 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was found in Bolt CMS 3.7.1. It has been rated as problematic. This issue affects some unknown processing of the file /preview/page of the component Entry Preview Handler. The manipulation of the argument body leads to cross site scripting. The attack may be initiated remotely. • https://vuldb.com/?ctiid.273167 https://vuldb.com/?id.273167 https://vuldb.com/?submit.379971 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

Bolt CMS contains a vulnerability in version 5.1.12 and below that allows an authenticated user with the ROLE_EDITOR privileges to upload and rename a malicious file to achieve remote code execution. Bolt CMS contiene una vulnerabilidad en versión 5.1.12 y anteriores, que permite a un usuario autenticado con privilegios ROLE_EDITOR descargar y renombrar un archivo malicioso para lograr una ejecución de código remota • https://github.com/lutrasecurity/CVE-2022-36532 http://bolt.com https://lutrasecurity.com/en/articles/cve-2022-36532 •

CVSS: 8.8EPSS: 7%CPEs: 1EXPL: 2

Bolt CMS <= 4.2 is vulnerable to Remote Code Execution. Unsafe theme rendering allows an authenticated attacker to edit theme to inject server-side template injection that leads to remote code execution. Bolt CMS versiones anteriores a 4.2 incluyéndola, es vulnerable a una ejecución de código remota. El renderizado no seguro del tema permite a un atacante autenticado editar el tema para inyectar la plantilla del lado del servidor que conlleva a una ejecución de código remota • http://boltcms.com https://github.com/bolt/core https://github.com/bolt/core/blob/3b21a73ebf519b76756d3ad2841312d10ef11461/src/Controller/Frontend/TemplateController.php https://github.com/iiSiLvEr/CVEs/tree/main/CVE-2021-40219 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 3

Bolt CMS <3.6.2 allows XSS via text input click preview button as demonstrated by the Title field of a Configured and New Entry. Bolt CMS, en versiones anteriores a la 3.6.2, permite Cross-Site Scripting (XSS) mediante el botón de previsualización de clicado en entradas de texto, tal y como queda demostrado con el campo Title de Configured y New Entry. Bolt CMS versions prior to 3.6.2 suffer from a cross site scripting vulnerability. • https://www.exploit-db.com/exploits/46014 https://github.com/rdincel1/Bolt-CMS-3.6.2---Cross-Site-Scripting https://www.raifberkaydincel.com/bolt-cms-xss-vulnerability.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •