Check CVE Id
Check CWE Id
In WonderCMS 2.3.1, the upload functionality accepts random application extensions and leads to malicious File Upload.
(Unrestricted Upload of File with Dangerous Type)
CVSS Base Score
In index.php in WonderCMS before 2.4.1, remote attackers can delete arbitrary files via directory traversal.
WonderCMS version 2.4.0 contains a Stored Cross-Site Scripting on File Upload through SVG vulnerability in uploadFileAction(), 'svg' => 'image/svg+xml' that can result in An attacker can execute arbitrary script on an unsuspecting user's browser. Thi...
** DISPUTED ** WonderCMS 2.3.1 is vulnerable to an HTTP Host header injection attack. It uses user-entered values to redirect pages. NOTE: the vendor reports that exploitation is unlikely because the attack can only come from a local machine or from...
WonderCMS before 2.0.3 has CSRF because of lack of a token in an unspecified context.
PHP remote file inclusion vulnerability in editInplace.php in Wonder CMS 2014 allows remote attackers to execute arbitrary PHP code via a URL in the hook parameter.
Wonder CMS 2014 allows remote attackers to obtain sensitive information by viewing /files/password, which reveals the unsalted MD5 hashed password.
Wonder CMS 2014 allows remote attackers to obtain sensitive information by logging into the application with an array for the password, which reveals the installation path in an error message.
Back to Top