cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-24980,https://securityvulnerability.io/vulnerability/CVE-2025-24980,User Enumeration Vulnerability in Pimcore Backend UI,"The Pimcore admin-ui-classic-bundle utilizes a 'Forgot password' function that improperly discloses existing user accounts through error messages. This vulnerability can lead to user enumeration, allowing attackers to know which accounts are valid on the target system. Affected versions do not implement a generic error message to obscure the existence or non-existence of accounts. Users are urged to upgrade to version 1.7.4 or later to protect against this issue, as there are currently no available workarounds.",Pimcore,Admin-ui-classic-bundle,6.9,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-07T19:56:10.439Z,0 CVE-2024-11956,https://securityvulnerability.io/vulnerability/CVE-2024-11956,SQL Injection Vulnerability in Pimcore Customer Data Framework,"A vulnerability has been identified in Pimcore's Customer Data Framework affecting versions up to 4.2.0. The issue arises from improper validation of user input in the /admin/customermanagementframework/customers/list functionality, which allows an attacker to manipulate the filterDefinition/filter argument, potentially leading to SQL injection. This can be exploited remotely, posing a significant risk to data integrity and confidentiality. Users are advised to update to version 4.2.1 or later to mitigate this vulnerability, as the exploit has been made public.",Pimcore,Customer-data-framework,5.1,MEDIUM,0.0007900000200606883,false,,false,false,true,2025-01-28T13:46:27.000Z,true,false,false,,2025-01-28T13:46:27.639Z,0 CVE-2024-11954,https://securityvulnerability.io/vulnerability/CVE-2024-11954,Cross-Site Scripting Vulnerability in Pimcore Search Document Component,"A cross-site scripting vulnerability exists in the Search Document component of Pimcore 11.4.2. This flaw allows attackers to manipulate the functionality and execute arbitrary scripts on the client side. Since the attack can be launched remotely, it poses a significant risk to users, as the exploit has been publicly disclosed. Proper validation and sanitization measures should be implemented to mitigate this vulnerability.",Pimcore,Pimcore,5.1,MEDIUM,0.00044999999227002263,false,,false,false,true,2025-01-28T13:14:42.000Z,true,false,false,,2025-01-28T13:14:42.976Z,0 CVE-2023-2332,https://securityvulnerability.io/vulnerability/CVE-2023-2332,Stored XSS vulnerability in Pricing Rules (pimcore versions 10.5.19 and lower),"A stored Cross-site Scripting (XSS) vulnerability is identified in the Conditions tab of Pricing Rules within Pimcore versions 10.5.19. This flaw resides in the From and To fields of the Date Range section, permitting an attacker to input malicious scripts. By exploiting this weakness, a threat actor could execute arbitrary JavaScript code within the user's browser session. Such exploitation can result in the theft of sensitive information, such as cookies, or redirect users to harmful or malicious websites. The vulnerability has been addressed in Pimcore version 10.5.21, emphasizing the importance of keeping software up to date to mitigate potential risks.",Pimcore,Pimcore/pimcore,4.8,MEDIUM,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-11-15T10:57:19.795Z,0 CVE-2024-49370,https://securityvulnerability.io/vulnerability/CVE-2024-49370,Password Management Vulnerability in Pimcore Data and Experience Management Platform,"Pimcore is a widely used open-source data and experience management platform that faces a serious vulnerability related to its user password management. When a PortalUserObject is linked to a PimcoreUser and has the setting 'Use Pimcore Backend Password' enabled, the password change function within the Portal Profile allows setting a new password without proper hashing. This flaw means that the new password can be exposed in plaintext to anyone with access to the user profile, potentially compromising user accounts. This vulnerability affects versions of the Pimcore portal engine prior to 4.1.7 and 3.1.16, highlighting the necessity for users to upgrade to these versions to mitigate risks.",Pimcore,Pimcore,4.9,MEDIUM,0.0004900000058114529,false,,false,false,false,,,false,false,,2024-10-23T15:15:00.000Z,0 CVE-2024-41109,https://securityvulnerability.io/vulnerability/CVE-2024-41109,Pimcore Admin Bundle Vulnerability,"Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. Navigating to `/admin/index/statistics` with a logged in Pimcore user exposes information about the Pimcore installation, PHP version, MYSQL version, installed bundles and all database tables and their row count in the system. This vulnerability is fixed in 1.5.2, 1.4.6, and 1.3.10.",Pimcore,Admin-ui-classic-bundle,6.3,MEDIUM,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-07-30T14:43:14.407Z,0 CVE-2024-32871,https://securityvulnerability.io/vulnerability/CVE-2024-32871,Pimcore Thumbnail Generation Vulnerability,"The Pimcore Data & Experience Management Platform has a vulnerability in its thumbnail generation functionality that can be exploited to flood the server with large files. By manipulating the file extension or the scaling factor of requested thumbnails, attackers can produce files that exceed the original file size significantly. This situation may lead to resource exhaustion on the server, potentially impacting the availability of the service. The issue has been addressed in version 11.2.4, emphasizing the importance of upgrading to mitigate this risk.",Pimcore,Pimcore,7.5,HIGH,0.0005600000149570405,false,,false,false,false,,,false,false,,2024-06-04T14:43:20.796Z,0 CVE-2024-29197,https://securityvulnerability.io/vulnerability/CVE-2024-29197,Previews Vulnerability in Pimcore Allows Unauthorized Access to Confidential Information,"Pimcore is an Open Source Data & Experience Management Platform. Any call with the query argument `?pimcore_preview=true` allows to view unpublished sites. In previous versions of Pimcore, session information would propagate to previews, so only a logged in user could open a preview. This no longer applies. Previews are broad open to any user and with just the hint of a restricted link one could gain access to possible confident / unreleased information. This vulnerability is fixed in 11.2.2 and 11.1.6.1. ",Pimcore,Pimcore,6.5,MEDIUM,0.0004299999854993075,false,,false,false,true,2024-03-25T18:47:01.000Z,true,false,false,,2024-03-26T15:10:41.792Z,0 CVE-2024-25625,https://securityvulnerability.io/vulnerability/CVE-2024-25625,Potential Security Vulnerability in Pimcore's Admin Classic Bundle,"A vulnerability in Pimcore's Admin Classic Bundle has been identified, specifically within the `invitationLinkAction` function of the UserController. This issue arises from improper handling of the HTTP host header, allowing an attacker to inject a malicious host header into requests directed at the /admin/user/invitationlink endpoint. As a result, URLs generated for user invitations may point to an attacker-controlled domain. The $loginUrl parameter in email invitations is constructed without proper validation of the host header, making this vulnerability a potential vector for phishing attacks. The recommended mitigation includes validating the host header to ensure it corresponds with the application's domain and employing a default trusted host mechanism when the incoming header is unrecognized or absent. Version 1.3.4 addresses this vulnerability with necessary patches.",Pimcore,Admin-ui-classic-bundle,8.1,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-19T15:41:29.147Z,0 CVE-2024-24822,https://securityvulnerability.io/vulnerability/CVE-2024-24822,Pimcore Fixes Tag Management Vulnerability in Admin Classic Bundle,"Pimcore's Admin Classic Bundle provides a backend user interface for Pimcore. Prior to version 1.3.3, an attacker can create, delete etc. tags without having the permission to do so. A fix is available in version 1.3.3. As a workaround, one may apply the patch manually.",Pimcore,Admin-ui-classic-bundle,6.5,MEDIUM,0.0006799999973736703,false,,false,false,false,,,false,false,,2024-02-07T17:17:58.580Z,0 CVE-2024-23646,https://securityvulnerability.io/vulnerability/CVE-2024-23646,Pimcore Admin Classic Bundle SQL Injection in Admin download files as zip,"The Pimcore Admin Classic Bundle, a backend interface for managing site files, suffers from a SQL Injection vulnerability due to improper validation of the `selectedIds` parameter in versions prior to 1.3.2. Any backend user with minimal permissions can leverage this vulnerability to execute arbitrary SQL commands, potentially allowing unauthorized access to sensitive data, modification of existing records, or elevation of their privileges to an administrative level. The issue has been resolved in version 1.3.2, which implements necessary input sanitization measures to prevent such exploitation.",pimcore,admin-ui-classic-bundle,8.8,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2024-01-24T19:41:49.578Z,0 CVE-2024-23648,https://securityvulnerability.io/vulnerability/CVE-2024-23648,Pimcore Admin Classic Bundle host header injection in the password reset,"The Admin Classic Bundle of Pimcore features a backend user interface that includes a password reset functionality. This system emails users a URL containing a unique token, which is valid for 24 hours, allowing them to reset their passwords. Prior to version 1.2.3, the vulnerability stemmed from how the reset-password URL was generated, leveraging the 'Host' HTTP header from the initial password reset request. Attackers could exploit this by sending fraudulent password reset requests, manipulating the 'Host' header to a controlled domain. If a user clicked the malicious link, the attacker could obtain the sensitive reset token, leading to potential account takeover. Users are advised to upgrade to version 1.2.3 or later to mitigate this risk.",pimcore,admin-ui-classic-bundle,8.8,HIGH,0.001829999964684248,false,,false,false,false,,,false,false,,2024-01-24T18:05:44.645Z,0 CVE-2024-21667,https://securityvulnerability.io/vulnerability/CVE-2024-21667,Pimcore Customer Data Framework Improper Access Control allows unprivileged user to access GDPR extracts,"pimcore/customer-data-framework is the Customer Management Framework for management of customer data within Pimcore. An authenticated and unauthorized user can access the GDPR data extraction feature and query over the information returned, leading to customer data exposure. Permissions are not enforced when reaching the `/admin/customermanagementframework/gdpr-data/search-data-objects` endpoint allowing an authenticated user without the permissions to access the endpoint and query the data available there. An unauthorized user can access PII data from customers. This vulnerability has been patched in version 4.0.6. ",pimcore,customer-data-framework,6.5,MEDIUM,0.0009399999980814755,false,,false,false,false,,,false,false,,2024-01-11T01:05:35.979Z,0 CVE-2024-21666,https://securityvulnerability.io/vulnerability/CVE-2024-21666,Pimcore Customer Data Framework Improper Access Control allows unprivileged user to access customers duplicates list,"The Customer Management Framework (CMF) for Pimcore adds functionality for customer data management, segmentation, personalization and marketing automation. An authenticated and unauthorized user can access the list of potential duplicate users and see their data. Permissions are enforced when reaching the `/admin/customermanagementframework/duplicates/list` endpoint allowing an authenticated user without the permissions to access the endpoint and query the data available there. Unauthorized user(s) can access PII data from customers. This vulnerability has been patched in version 4.0.6. ",pimcore,customer-data-framework,6.5,MEDIUM,0.0009399999980814755,false,,false,false,false,,,false,false,,2024-01-11T00:45:44.520Z,0 CVE-2024-21665,https://securityvulnerability.io/vulnerability/CVE-2024-21665,Pimcore Ecommerce Framework Bundle Improper Access Control allows unprivileged user to access back-office orders list,ecommerce-framework-bundle is the Pimcore Ecommerce Framework Bundle. An authenticated and unauthorized user can access the back-office orders list and be able to query over the information returned. Access control and permissions are not being enforced. This vulnerability has been patched in version 1.0.10.,pimcore,ecommerce-framework-bundle,4.3,MEDIUM,0.0005699999746866524,false,,false,false,false,,,false,false,,2024-01-11T00:39:48.848Z,0 CVE-2023-49076,https://securityvulnerability.io/vulnerability/CVE-2023-49076,Pimcore missing token/header to prevent CSRF,"Customer-data-framework allows management of customer data within Pimcore. There are no tokens or headers to prevent CSRF attacks from occurring, therefore an attacker could abuse this vulnerability to create new customers. This issue has been patched in version 4.0.5.",pimcore,customer-data-framework,6.5,MEDIUM,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-11-30T06:15:00.000Z,0 CVE-2023-49075,https://securityvulnerability.io/vulnerability/CVE-2023-49075,Pimcore Admin UI has Two Factor Authentication disabled for non admin security firewalls,"The Admin Classic Bundle for Pimcore has a vulnerability that disables two-factor authentication across all non-admin security firewalls. This flaw allows authenticated users to bypass the two-factor authentication mechanism, providing them access to the system without the additional security credentials typically required. This issue was rectified in version 1.2.2, ensuring that the two-factor authentication process remains intact for all users.",pimcore,admin-ui-classic-bundle,7.2,HIGH,0.001339999958872795,false,,false,false,false,,,false,false,,2023-11-28T05:15:00.000Z,0 CVE-2023-47636,https://securityvulnerability.io/vulnerability/CVE-2023-47636,Full Path Disclosure via re-export document in pimcore/admin-ui-classic-bundle,"The Pimcore Admin Classic Bundle provides a Backend UI for Pimcore. Full Path Disclosure (FPD) vulnerabilities enable the attacker to see the path to the webroot/file. e.g.: /home/omg/htdocs/file/. Certain vulnerabilities, such as using the load_file() (within a SQL Injection) query to view the page source, require the attacker to have the full path to the file they wish to view. In the case of pimcore, the fopen() function here doesn't have an error handle when the file doesn't exist on the server so the server response raises the full path ""fopen(/var/www/html/var/tmp/export-{ uniqe id}.csv)"". This issue has been patched in commit `10d178ef771` which has been included in release version 1.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. ",Pimcore,Admin-ui-classic-bundle,5.3,MEDIUM,0.0008800000068731606,false,,false,false,false,,,false,false,,2023-11-15T20:15:00.000Z,0 CVE-2023-47637,https://securityvulnerability.io/vulnerability/CVE-2023-47637,SQL Injection in Admin Grid Filter API in Pimcore,"The Pimcore Open Source Data & Experience Management Platform is vulnerable to SQL injection through the `/admin/object/grid-proxy` endpoint. This vulnerability arises when the `getFilterCondition()` method processes unsanitized input, permitting malicious users with basic permissions to execute arbitrary SQL queries. This flaw could lead to unauthorized data modifications or privilege escalations to admin-level access. Users are strongly encouraged to upgrade to version 11.1.1 to mitigate risks associated with this vulnerability. No workarounds are available.",Pimcore,Pimcore,8.8,HIGH,0.0012799999676644802,false,,false,false,false,,,false,false,,2023-11-15T20:15:00.000Z,0 CVE-2023-46722,https://securityvulnerability.io/vulnerability/CVE-2023-46722,Pimcore Admin Classic Bundle Cross-site Scripting (XSS) in PDF previews,"The Pimcore Admin Classic Bundle provides a backend UI for Pimcore. Prior to version 1.2.0, a cross-site scripting vulnerability has the potential to steal a user's cookie and gain unauthorized access to that user's account through the stolen cookie or redirect users to other malicious sites. Users should upgrade to version 1.2.0 to receive a patch or, as a workaround, apply the patch manually.",Pimcore,Admin-ui-classic-bundle,6.1,MEDIUM,0.0007900000200606883,false,,false,false,false,,,false,false,,2023-10-31T16:15:00.000Z,0 CVE-2023-5873,https://securityvulnerability.io/vulnerability/CVE-2023-5873,Cross-site Scripting (XSS) - Stored in pimcore/pimcore,Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 11.1.0.,pimcore,pimcore/pimcore,5.4,MEDIUM,0.0005200000014156103,false,,false,false,false,,,false,false,,2023-10-31T09:15:00.000Z,0 CVE-2023-5844,https://securityvulnerability.io/vulnerability/CVE-2023-5844,Unverified Password Change in pimcore/admin-ui-classic-bundle,Unverified Password Change in GitHub repository pimcore/admin-ui-classic-bundle prior to 1.2.0.,Pimcore,Pimcore/admin-ui-classic-bundle,4.3,MEDIUM,0.0008500000112690032,false,,false,false,false,,,false,false,,2023-10-30T11:15:00.000Z,0 CVE-2023-5192,https://securityvulnerability.io/vulnerability/CVE-2023-5192,Excessive Data Query Operations in a Large Data Table in pimcore/demo,Excessive Data Query Operations in a Large Data Table in GitHub repository pimcore/demo prior to 10.3.0.,Pimcore,Pimcore/demo,6.1,MEDIUM,0.0006600000197067857,false,,false,false,false,,,false,false,,2023-09-27T15:19:00.000Z,0 CVE-2023-42817,https://securityvulnerability.io/vulnerability/CVE-2023-42817,Cross-site Scripting (XSS) in pimcore admin-ui-classic-bundle translations,"Pimcore admin-ui-classic-bundle provides a Backend UI for Pimcore. The translation value with text including “%s” (from “%suggest%) is parsed by sprintf() even though it’s supposed to be output literally to the user. The translations may be accessible by a user with comparatively lower overall access (as the translation permission cannot be scoped to certain “modules”) and a skilled attacker might be able to exploit the parsing of the translation string in the dialog box. This issue has been patched in commit `abd77392` which is included in release 1.1.2. Users are advised to update to version 1.1.2 or apply the patch manually. ",Pimcore,Admin-ui-classic-bundle,5.4,MEDIUM,0.0004799999878741801,false,,false,false,false,,,false,false,,2023-09-25T19:15:00.000Z,0 CVE-2023-4453,https://securityvulnerability.io/vulnerability/CVE-2023-4453,Cross-site Scripting (XSS) - Reflected in pimcore/pimcore,Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.6.8.,Pimcore,Pimcore/pimcore,6.4,MEDIUM,0.0005200000014156103,false,,false,false,false,,,false,false,,2023-08-21T10:15:00.000Z,0