Dot CMS

dotCMS is an open source headless/hybrid content management system (CMS) that has been designed to manage and deliver personalized permission-based content experiences across multiple channels. dotCMS can can serve as a headless content hub and also as a platform for sites mobile apps mini-sites portals intranets. dotCMS is used everywhere from running small sites to powering multi-node installations for governments Fortune 100 companies Universities and Global Brands. Written in java dotCMS environment can scale to support hundreds of editors managing thousands of sites with millions of content objects.

Severity Summary:

Critical: 6 High: 18 Medium: 29 Low: 1
Reference
Title
Severity
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
Dot CMS Other Vulnerability
Critical
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
Critical
Dot CMS Unrestricted Upload of File with Dangerous Type Vulnerability
Critical
Dot CMS Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Critical
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
High
Dot CMS Unrestricted Upload of File with Dangerous Type Vulnerability
High
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
High
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
High
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
High
Dot CMS Cross-Site Request Forgery (CSRF) Vulnerability
High
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
High
Dot CMS Unrestricted Upload of File with Dangerous Type Vulnerability
High
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
High
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
High
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
High
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
High
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
High
Dot CMS Improper Neutralization of Special Elements in Output Used by a Downstream Component (Injection) Vulnerability
High
Dot CMS Permissions Privileges and Access Controls Vulnerability
High
Dot CMS Other Vulnerability
High
Dot CMS Improper Neutralization of Special Elements used in an SQL Command (SQL Injection) Vulnerability
High
Dot CMS Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Vulnerability
High
Dot CMS Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
Medium
Dot CMS Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Medium
Dot CMS Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Medium
Dot CMS Improper Neutralization of Input During Web Page Generation (Cross-site Scripting) Vulnerability
Medium
Dot CMS Permissions Privileges and Access Controls Vulnerability
Medium
Dot CMS Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Vulnerability
Medium