
CVE-2011-10003 – XpressEngine Update Query sql injection
https://notcve.org/view.php?id=CVE-2011-10003
07 Feb 2023 — A vulnerability was found in XpressEngine up to 1.4.4. It has been rated as critical. This issue affects some unknown processing of the component Update Query Handler. The manipulation leads to sql injection. Upgrading to version 1.4.5 is able to address this issue. • https://github.com/haegyung/xe-core/commit/c6e94449f21256d6362450b29c7847305e756ad5 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2021-26642 – XpressEngine file upload vulnerability
https://notcve.org/view.php?id=CVE-2021-26642
20 Jan 2023 — When uploading an image file to a bulletin board developed with XpressEngine, a vulnerability in which an arbitrary file can be uploaded due to insufficient verification of the file. A remote attacker can use this vulnerability to execute arbitrary code on the server where the bulletin board is running. • https://boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=67125 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2021-44912
https://notcve.org/view.php?id=CVE-2021-44912
09 Feb 2022 — In XE 1.116, when uploading the Normal button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities. If the .htaccess configuration is improper, for example before the XE 1.11.2 version, you can upload the PHP type file to GETSHELL. En XE versión 1.116, cuando es subido el botón Normal, no se presenta restricción en el sufijo del archivo, lo que conlleva... • https://github.com/xpressengine/xe-core/issues/2433 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-44911
https://notcve.org/view.php?id=CVE-2021-44911
09 Feb 2022 — XE before 1.11.6 is vulnerable to Unrestricted file upload via modules/menu/menu.admin.controller.php. When uploading the Mouse over button and When selected button, there is no restriction on the file suffix, which leads to any file uploading to the files directory. Since .htaccess only restricts the PHP type, uploading HTML-type files leads to stored XSS vulnerabilities. XE versiones anteriores a 1.11.6, es vulnerable a una carga de archivos sin restricciones por medio del archivo modules/menu/menu.admin.... • https://github.com/xpressengine/xe-core/issues/2434 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •