CVE Vulnerabilities for "product:kentico"

Showing 1-10 of 18 CVEs (filtered from 316,502 total)

In Kentico before 13.0.66, attackers can achieve Denial of Service via a crafted request to the GetResource handler.

HIGH 7.5
EPSS 1.0%
7/18/2022
2022

Kentico CMS before 13.0.66 has an Insecure Direct Object Reference vulnerability. It allows an attacker with user management rights (default is Administrator) to export the user options of any user, even ones with higher privileges (like Global Administrators) than the current user. The exported XML contains every option of the exported user (even the hashed password).

MEDIUM 4.9
EPSS 0.3%
4/16/2022
2022

Kentico Xperience 13.0.44 allows XSS via an XML document to the Media Libraries subsystem.

MEDIUM 6.1
EPSS 0.2%
1/10/2022
2021

The Blog module in Kentico CMS 5.5 R2 build 5.5.3996 allows SQL injection via the tagname parameter.

CRITICAL 9.8
EPSS 0.4%
3/5/2021
2021

Cross Site Scripting (XSS) vulnerability in Kentico before 12.0.75.

MEDIUM 6.1
EPSS 0.4%
9/9/2020
2020

Kentico before 12.0.50 allows file uploads in which the Content-Type header is inconsistent with the file extension, leading to XSS.

MEDIUM 5.4
EPSS 0.7%
1 exploit
12/2/2019
2019

Kentico 11 through 12 lets attackers upload and explore files without authentication via the cmsmodules/medialibrary/formcontrols/liveselectors/insertimageormedia/tabs_media.aspx URI. NOTE: The vendor disputes the report because the researcher did not configure the media library permissions correctly. The vendor states that by default all users can read/modify/upload files, and it’s up to the administrator to decide who should have access to the media library and set the permissions accordingly. See the vendor documentation in the references for more information

CRITICAL 9.1
EPSS 0.2%
1 exploit
5/22/2019
2019

Kentico CMS before 11.0.45 allows unrestricted upload of a file with a dangerous type.

HIGH 8.8
EPSS 0.4%
4/10/2019
2018
CVE-2019-10068
⚠️🧬

An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted.

CRITICAL 9.8
EPSS 94.1%
3/26/2019
2019

Kentico v10.0.42 allows Global Administrators to read the cleartext SMTP Password by navigating to the SMTP configuration page. NOTE: the vendor considers this a best-practice violation but not a vulnerability. The vendor plans to fix it at a future time

HIGH 7.2
EPSS 0.5%
2/8/2019
2019
Page 1 of 2