CVE-2018-19135

HIGH

Clippercms - CSRF

Title source: rule
STIX 2.1

Description

ClipperCMS 1.3.3 does not have CSRF protection on its kcfinder file upload (enabled by default). This can be used by an attacker to perform actions for an admin (or any user with the file upload capability). With this vulnerability, one can automatically upload files (by default, it allows html, pdf, xml, zip, and many other file types). A file can be accessed publicly under the "/assets/files" directory.

Exploits (1)

exploitdb WORKING POC
by Ameer Pornillos · textwebappsphp
https://www.exploit-db.com/exploits/45839

References (2)

Core 2
Core References
Exploit, Issue Tracking, Third Party Advisory x_refsource_misc
https://github.com/ClipperCMS/ClipperCMS/issues/494
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/45839/

Scores

CVSS v3 8.8
EPSS 0.0028
EPSS Percentile 51.7%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-352
Status published
Products (1)
clippercms/clippercms 1.3.3
Published Nov 11, 2018
Tracked Since Feb 18, 2026