Product:

Subrion

(Intelliants)
Repositories https://github.com/intelliants/subrion
#Vulnerabilities 24
Date Id Summary Products Score Patch Annotated
2023-11-03 CVE-2023-46947 Subrion 4.2.1 has a remote command execution vulnerability in the backend. Subrion 8.8
2023-09-28 CVE-2023-43884 A Cross-site scripting (XSS) vulnerability in Reference ID from the panel Transactions, of Subrion v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into 'Reference ID' parameter. Subrion 5.4
2023-09-27 CVE-2023-43828 A Cross-site scripting (XSS) vulnerability in /panel/languages/ of Subrion v4.2.1 allow attackers to execute arbitrary web scripts or HTML via a crafted payload injected into 'Title' parameter. Subrion 5.4
2023-09-27 CVE-2023-43830 A Cross-site scripting (XSS) vulnerability in /panel/configuration/financial/ of Subrion v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into several fields: 'Minimum deposit', 'Maximum deposit' and/or 'Maximum balance'. Subrion 5.4
2022-04-29 CVE-2021-41948 A cross-site scripting (XSS) vulnerability exists in the "contact us" plugin for Subrion CMS <= 4.2.1 version via "List of subjects". Subrion 5.4
2021-08-06 CVE-2020-22330 Cross-Site Scripting (XSS) vulnerability in Subrion 4.2.1 via the title when adding a page. Subrion 6.1
2021-07-14 CVE-2020-18155 SQL Injection vulnerability in Subrion CMS v4.2.1 in the search page if a website uses a PDO connection. Subrion 9.8
2021-04-09 CVE-2020-23761 Cross Site Scripting (XSS) vulnerability in subrion CMS Version <= 4.2.1 allows remote attackers to execute arbitrary web script via the "payment gateway" column on transactions tab. Subrion 6.1
2020-11-04 CVE-2019-7356 Subrion CMS v4.2.1 allows XSS via the panel/phrases/ VALUE parameter. Subrion 5.4
2020-05-15 CVE-2019-20390 A Cross-Site Request Forgery (CSRF) vulnerability was discovered in Subrion CMS 4.2.1 that allows a remote attacker to remove files on the server without a victim's knowledge, by enticing an authenticated user to visit an attacker's web page. The application fails to validate the CSRF token for a GET request. An attacker can craft a panel/uploads/read.json?cmd=rm URL (removing this token) and send it to the victim. Subrion N/A