Description
MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68.
References (4)
Core 4
Core References
Exploit, Third Party Advisory x_refsource_misc
https://rudnkh.me/posts/critical-vulnerability-in-modx-revolution-2-6-4
Exploit, Third Party Advisory x_refsource_confirm
https://github.com/modxcms/revolution/pull/13979
Broken Link, Third Party Advisory x_refsource_misc
https://github.com/a2u/CVE-2018-1000207
Patch, Third Party Advisory x_refsource_confirm
https://github.com/modxcms/revolution/commit/06bc94257408f6a575de20ddb955aca505ef6e68
Scores
CVSS v3
7.2
EPSS
0.0382
EPSS Percentile
88.2%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2018-09-26
CWE
CWE-732
Status
published
Products (2)
modx/modx_revolution
< 2.6.4
modx/revolution
0 - 2.7.0Packagist
Published
Jul 13, 2018
Tracked Since
Feb 18, 2026