📦 Icms

by Idreamsoft

🔍 What is Icms?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2023-39805

CRITICAL CVSS 9.8 Aug 10, 2023

CVE-2023-39805 is a SQL injection vulnerability in iCMS v7.0.16 that allows attackers to execute arbitrary SQL commands via the where parameter in admincp.php. This affects all users running the vulne...

CVE-2021-44978

CRITICAL CVSS 9.8 Feb 4, 2022

This CVE describes a server-side template injection (SSTI) vulnerability in iCMS that allows authenticated users to add and render custom templates, leading to remote code execution. The vulnerability...

CVE-2020-18070

CRITICAL CVSS 9.1 Apr 30, 2021

This path traversal vulnerability in iCMS v7.0.13 allows remote attackers to delete arbitrary folders on the server by sending specially crafted HTTP requests to the database.admincp.php component. At...

CVE-2020-19527

CRITICAL CVSS 9.8 Dec 10, 2020

CVE-2020-19527 is a critical OS command injection vulnerability in iCMS 7.0.14 that allows attackers to execute arbitrary commands on the server by injecting shell metacharacters into the DB_NAME para...

CVE-2023-40953

HIGH CVSS 8.8 Sep 8, 2023

CVE-2023-40953 is a Cross-Site Request Forgery (CSRF) vulnerability in icms 7.0.16 that allows attackers to trick authenticated users into performing unintended actions, such as modifying settings or ...

CVE-2021-44977

HIGH CVSS 7.5 Feb 4, 2022

This CVE describes a directory traversal vulnerability in iCMS content management system that allows attackers to read arbitrary files on the server. The vulnerability affects iCMS versions up to and ...

CVE-2020-26641

HIGH CVSS 8.8 May 28, 2021

This CSRF vulnerability in iCMS 7.0.16 allows attackers to trick authenticated users into executing malicious web scripts without their knowledge. Attackers can perform unauthorized actions on behalf ...

CVE-2025-15394

MEDIUM CVSS 4.7 Dec 31, 2025

This vulnerability allows remote attackers to execute arbitrary code on iCMS systems through code injection in the configuration parameter handler. Attackers can exploit this by manipulating POST para...