Vulnerabilities (CVE)

Filtered by vendor Ujcms Subscribe
Filtered by product Ujcms
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-51806 1 Ujcms 1 Ujcms 2025-06-20 N/A 5.4 MEDIUM
File Upload vulnerability in Ujcms v.8.0.2 allows a local attacker to execute arbitrary code via a crafted file.
CVE-2023-51350 1 Ujcms 1 Ujcms 2025-06-16 N/A 9.8 CRITICAL
A spoofing attack in ujcms v.8.0.2 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted script to the X-Forwarded-For function in the header.
CVE-2024-55451 1 Ujcms 1 Ujcms 2025-04-24 N/A 4.8 MEDIUM
A Stored Cross-Site Scripting (XSS) vulnerability exists in authenticated SVG file upload and viewing functionality in UJCMS 9.6.3. The vulnerability arises from insufficient sanitization of embedded attributes in uploaded SVG files. When a maliciously crafted SVG file is viewed by other backend users, it allows authenticated attackers to execute arbitrary JavaScript in the context of other backend users' browsers, potentially leading to the theft of sensitive tokens.
CVE-2024-55452 1 Ujcms 1 Ujcms 2025-04-24 N/A 5.4 MEDIUM
A URL redirection vulnerability exists in UJCMS 9.6.3 due to improper validation of URLs in the upload and rendering of new block / carousel items. This vulnerability allows authenticated attackers to redirect unprivileged users to an arbitrary, attacker-controlled webpage. When an authenticated user clicks on the malicious block item, they are redirected to the arbitrary untrusted domains, where sensitive tokens, such as JSON Web Tokens, can be stolen via a crafted webpage.
CVE-2023-24369 1 Ujcms 1 Ujcms 2025-03-18 N/A 6.1 MEDIUM
A cross-site scripting (XSS) vulnerability in UJCMS v4.1.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the URL parameter under the Add New Articles function.
CVE-2024-12483 1 Ujcms 1 Ujcms 2024-12-13 2.6 LOW 3.7 LOW
A vulnerability classified as problematic has been found in Dromara UJCMS up to 9.6.3. This affects an unknown part of the file /users/id of the component User ID Handler. The manipulation leads to authorization bypass. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used.