Check CVE Id
Check CWE Id
In index.php in WonderCMS before 2.4.1, remote attackers can delete arbitrary files via directory traversal.
(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))
CVSS Base Score
An issue was discovered in WonderCMS before 2.5.2. An attacker can create a new session on a web application and record the associated session identifier. The attacker then causes the victim to authenticate against the server using the same session i...
WonderCMS version 2.4.0 contains a Stored Cross-Site Scripting on File Upload through SVG vulnerability in uploadFileAction(), 'svg' => 'image/svg+xml' that can result in An attacker can execute arbitrary script on an unsuspecting user's browser. Thi...
** DISPUTED ** WonderCMS 2.3.1 is vulnerable to an HTTP Host header injection attack. It uses user-entered values to redirect pages. NOTE: the vendor reports that exploitation is unlikely because the attack can only come from a local machine or from...
In WonderCMS 2.3.1, the upload functionality accepts random application extensions and leads to malicious File Upload.
WonderCMS before 2.0.3 has CSRF because of lack of a token in an unspecified context.
PHP remote file inclusion vulnerability in editInplace.php in Wonder CMS 2014 allows remote attackers to execute arbitrary PHP code via a URL in the hook parameter.
Wonder CMS 2014 allows remote attackers to obtain sensitive information by viewing /files/password, which reveals the unsalted MD5 hashed password.
Back to Top