Craft CMS 3.4.14

CPE Details

Craft CMS 3.4.14
3.4.14
2020-06-24
15h51 +00:00
2020-06-24
15h51 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:craftcms:craft_cms:3.4.14:*:*:*:*:*:*:*

Informations

Vendor

craftcms

Product

craft_cms

Version

3.4.14

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2024-37843 2024-06-24 22h00 +00:00 Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint.
9.8
Critique
CVE-2023-36260 2024-01-29 23h00 +00:00 An issue was discovered in the Feed Me plugin 4.6.1 for Craft CMS. It allows remote attackers to cause a denial of service (DoS) via crafted strings to Feed-Me Name and Feed-Me URL fields, due to saving a feed using an Asset element type with no volume selected. NOTE: this is not a report about code provided by the Craft CMS product; it is only a report about the Feed Me plugin. NOTE: a third-party report states that commit b5d6ede51848349bd91bc95fec288b6793f15e28 has "nothing to do with security."
7.5
Haute
CVE-2024-21622 2024-01-03 16h51 +00:00 Craft is a content management system. This is a potential moderate impact, low complexity privilege escalation vulnerability in Craft starting in 3.x prior to 3.9.6 and 4.x prior to 4.4.16 with certain user permissions setups. This has been fixed in Craft 4.4.16 and Craft 3.9.6. Users should ensure they are running at least those versions.
8.8
Haute
CVE-2023-40035 2023-08-23 20h05 +00:00 Craft is a CMS for creating custom digital experiences on the web and beyond. Bypassing the validatePath function can lead to potential remote code execution. This vulnerability can lead to malicious control of vulnerable systems and data exfiltrations. Although the vulnerability is exploitable only in the authenticated users, configuration with ALLOW_ADMIN_CHANGES=true, there is still a potential security threat (Remote Code Execution). This issue has been patched in version 4.4.15 and version 3.8.15.
7.2
Haute
CVE-2023-33495 2023-06-19 22h00 +00:00 Craft CMS through 4.4.9 is vulnerable to HTML Injection.
6.1
Moyen
CVE-2023-33194 2023-05-26 20h30 +00:00 Craft is a CMS for creating custom digital experiences on the web.The platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload. Old CVE fixed the XSS in label HTML but didn’t fix it when clicking save. This issue was patched in version 4.4.6.
4.8
Moyen
CVE-2023-33197 2023-05-26 19h17 +00:00 Craft is a CMS for creating custom digital experiences on the web. Cross-site scripting (XSS) can be triggered via the Update Asset Index utility. This issue has been patched in version 4.4.6.
5.5
Moyen
CVE-2023-2817 2023-05-25 22h00 +00:00 A post-authentication stored cross-site scripting vulnerability exists in Craft CMS versions <= 4.4.11. HTML, including script tags can be injected into field names which, when the field is added to a category or section, will trigger when users visit the Categories or Entries pages respectively.
5.4
Moyen
CVE-2023-31144 2023-05-09 15h22 +00:00 Craft CMS is a content management system. Starting in version 3.0.0 and prior to versions 3.8.4 and 4.4.4, a malformed title in the feed widget can deliver a cross-site scripting payload. This issue is fixed in version 3.8.4 and 4.4.4.
6.1
Moyen
CVE-2023-23927 2023-03-03 21h58 +00:00 Craft is a platform for creating digital experiences. When you insert a payload inside a label name or instruction of an entry type, an cross-site scripting (XSS) happens in the quick post widget on the admin dashboard. This issue has been fixed in version 4.3.7.
6.1
Moyen
CVE-2022-37783 2022-12-04 23h00 +00:00 All Craft CMS versions between 3.0.0 and 3.7.32 disclose password hashes of users who authenticate using their E-Mail address or username in Anti-CSRF-Tokens. Craft CMS uses a cookie called CRAFT_CSRF_TOKEN and a HTML hidden field called CRAFT_CSRF_TOKEN to avoid Cross Site Request Forgery attacks. The CRAFT_CSRF_TOKEN cookie discloses the password hash in without encoding it whereas the corresponding HTML hidden field discloses the users' password hash in a masked manner, which can be decoded by using public functions of the YII framework.
7.5
Haute
CVE-2022-29933 2022-05-09 15h48 +00:00 Craft CMS through 3.7.36 allows a remote unauthenticated attacker, who knows at least one valid username, to reset the account's password and take over the account by providing a crafted HTTP header to the application while using the password reset functionality. Specifically, the attacker must send X-Forwarded-Host to the /index.php?p=admin/actions/users/send-password-reset-email URI. NOTE: the vendor's position is that a customer can already work around this by adjusting the configuration (i.e., by not using the default configuration).
8.8
Haute
CVE-2022-28378 2022-04-03 15h28 +00:00 Craft CMS before 3.7.29 allows XSS.
6.1
Moyen
CVE-2021-41824 2021-09-29 21h19 +00:00 Craft CMS before 3.7.14 allows CSV injection.
8.8
Haute
CVE-2021-27903 2021-06-30 09h56 +00:00 An issue was discovered in Craft CMS before 3.6.7. In some circumstances, a potential Remote Code Execution vulnerability existed on sites that did not restrict administrative changes (if an attacker were somehow able to hijack an administrator's session).
9.8
Critique
CVE-2021-27902 2021-06-30 09h56 +00:00 An issue was discovered in Craft CMS before 3.6.0. In some circumstances, a potential XSS vulnerability existed in connection with front-end forms that accepted user uploads.
6.1
Moyen
CVE-2021-32470 2021-05-07 15h02 +00:00 Craft CMS before 3.6.13 has an XSS vulnerability.
6.1
Moyen