Filtered by vendor Seeddms
Subscribe
Total
33 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-25461 | 1 Seeddms | 1 Seeddms | 2025-07-09 | N/A | N/A |
A Stored Cross-Site Scripting (XSS) vulnerability exists in SeedDMS 6.0.29. A user or rogue admin with the "Add Category" permission can inject a malicious XSS payload into the category name field. When a document is subsequently associated with this category, the payload is stored on the server and rendered without proper sanitization or output encoding. This results in the XSS payload executing in the browser of any user who views the document. | |||||
CVE-2024-46409 | 1 Seeddms | 1 Seeddms | 2025-07-03 | N/A | N/A |
A stored cross-site scripting (XSS) vulnerability in SeedDMS v6.0.28 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter in the Calendar page. | |||||
CVE-2025-45754 | 1 Seeddms | 1 Seeddms | 2025-06-25 | N/A | N/A |
A stored cross-site scripting (XSS) vulnerability exists in SeedDMS 6.0.32. This vulnerability allows an attacker to inject malicious JavaScript payloads by creating a document with an XSS payload as the document name. | |||||
CVE-2025-45752 | 1 Seeddms | 1 Seeddms | 2025-06-13 | N/A | N/A |
A vulnerability in SeedDMS 6.0.32 allows an attacker with admin privileges to execute arbitrary PHP code by exploiting the zip import functionality in the Extension Manager. | |||||
CVE-2022-44938 | 1 Seeddms | 1 Seeddms | 2025-04-23 | N/A | 9.8 CRITICAL |
Weak reset token generation in SeedDMS v6.0.20 and v5.1.7 allows attackers to execute a full account takeover via a brute force attack. | |||||
CVE-2021-39425 | 1 Seeddms | 1 Seeddms | 2023-11-07 | N/A | 6.1 MEDIUM |
SeedDMS v6.0.15 was discovered to contain an open redirect vulnerability. An attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links. | |||||
CVE-2021-39421 | 1 Seeddms | 1 Seeddms | 2023-11-07 | N/A | 6.1 MEDIUM |
A cross-site scripting (XSS) vulnerability in SeedDMS v6.0.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | |||||
CVE-2021-35343 | 1 Seeddms | 1 Seeddms | 2023-11-07 | 4.3 MEDIUM | 4.3 MEDIUM |
Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.Ajax.php in SeedDMS v5.1.x<5.1.23 and v6.0.x<6.0.16 allows a remote attacker to edit document name without victim's knowledge, by enticing an authenticated user to visit an attacker's web page. | |||||
CVE-2021-36542 | 1 Seeddms | 1 Seeddms | 2023-11-07 | 4.3 MEDIUM | 4.3 MEDIUM |
Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.LockDocument.php in SeedDMS v5.1.x<5.1.23 and v6.0.x <6.0.16 allows a remote attacker to lock any document without victim's knowledge, by enticing an authenticated user to visit an attacker's web page. | |||||
CVE-2021-33223 | 1 Seeddms | 1 Seeddms | 2023-06-15 | N/A | 8.8 HIGH |
An issue discovered in SeedDMS 6.0.15 allows an attacker to escalate privileges via the userid and role parameters in the out.UsrMgr.php file. | |||||
CVE-2022-28478 | 1 Seeddms | 1 Seeddms | 2022-06-14 | 5.5 MEDIUM | 6.5 MEDIUM |
SeedDMS 6.0.17 and 5.1.24 are vulnerable to Directory Traversal. The "Remove file" functionality inside the "Log files management" menu does not sanitize user input allowing attackers with admin privileges to delete arbitrary files on the remote system. | |||||
CVE-2022-28479 | 1 Seeddms | 1 Seeddms | 2022-06-14 | 3.5 LOW | 4.8 MEDIUM |
SeedDMS versions 6.0.18 and 5.1.25 and below are vulnerable to stored XSS. An attacker with admin privileges can inject the payload inside the "Role management" menu and then trigger the payload by loading the "Users management" menu | |||||
CVE-2022-28051 | 1 Seeddms | 1 Seeddms | 2022-06-13 | 3.5 LOW | 5.4 MEDIUM |
The "Add category" functionality inside the "Global Keywords" menu in "SeedDMS" version 6.0.18 and 5.1.25, is prone to stored XSS which allows an attacker to inject malicious javascript code. | |||||
CVE-2021-45408 | 1 Seeddms | 1 Seeddms | 2022-02-09 | 5.8 MEDIUM | 6.1 MEDIUM |
Open Redirect vulnerability exists in SeedDMS 6.0.15 in out.Login.php, which llows remote malicious users to redirect users to malicious sites using the "referuri" parameter. | |||||
CVE-2020-23048 | 1 Seeddms | 1 Seeddms | 2021-10-27 | 4.3 MEDIUM | 6.1 MEDIUM |
SeedDMS Content Management System v6.0.7 contains a persistent cross-site scripting (XSS) vulnerability in the component AddEvent.php via the name and comment parameters. | |||||
CVE-2021-36543 | 1 Seeddms | 1 Seeddms | 2021-08-10 | 4.3 MEDIUM | 4.3 MEDIUM |
Cross-Site Request Forgery (CSRF) vulnerability in the /op/op.UnlockDocument.php in SeedDMS v5.1.x <5.1.23 and v6.0.x <6.0.16 allows a remote attacker to unlock any document without victim's knowledge, by enticing an authenticated user to visit an attacker's web page. | |||||
CVE-2019-12744 | 1 Seeddms | 1 Seeddms | 2021-06-25 | 6.0 MEDIUM | 7.5 HIGH |
SeedDMS before 5.1.11 allows Remote Command Execution (RCE) because of unvalidated file upload of PHP scripts, a different vulnerability than CVE-2018-12940. | |||||
CVE-2021-26216 | 1 Seeddms | 1 Seeddms | 2021-03-22 | 4.3 MEDIUM | 4.3 MEDIUM |
SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditFolder.php. | |||||
CVE-2021-26215 | 1 Seeddms | 1 Seeddms | 2021-03-22 | 4.3 MEDIUM | 4.3 MEDIUM |
SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditDocument.php. | |||||
CVE-2020-28727 | 1 Seeddms | 1 Seeddms | 2020-12-07 | 4.3 MEDIUM | 6.1 MEDIUM |
Cross-site scripting (XSS) exists in SeedDMS 6.0.13 via the folderid parameter to views/bootstrap/class.DropFolderChooser.php. |