📦 Limesurvey

by Limesurvey

🔍 What is Limesurvey?

Description coming soon...

🛡️ Security Overview

Click on a severity to filter vulnerabilities

⚠️ Known Vulnerabilities

CVE-2025-41375

CRITICAL CVSS 9.8 Aug 1, 2025

A SQL injection vulnerability in LimeSurvey v2.65.1+170522 allows attackers to manipulate database queries via the 'token' parameter in the '/index.php' endpoint. This enables unauthorized database ac...

CVE-2019-25019

CRITICAL CVSS 9.8 Feb 14, 2021

This SQL injection vulnerability in LimeSurvey's participant model allows attackers to execute arbitrary SQL commands on the database. It affects all LimeSurvey installations before version 4.0.0-RC4,...

CVE-2025-41074

HIGH CVSS 7.5 Nov 20, 2025

This vulnerability in LimeSurvey's /optout endpoint causes infinite HTTP redirects when accessed directly, creating a denial-of-service condition. Attackers can exploit this to exhaust server resource...

CVE-2025-41075

HIGH CVSS 7.5 Nov 20, 2025

This vulnerability in LimeSurvey 6.13.0 creates an infinite redirect loop when accessing the /optin endpoint directly. Attackers can exploit this to cause denial of service by exhausting server or cli...

CVE-2024-42902

HIGH CVSS 8.8 Sep 3, 2024

This vulnerability allows attackers to execute arbitrary code on LimeSurvey servers by injecting malicious payloads into the lng parameter of the js_localize.php function. It affects LimeSurvey instal...

CVE-2025-41076

MEDIUM CVSS 6.5 Nov 20, 2025

This vulnerability allows external users to trigger a 500 error in LimeSurvey by sending malformed session cookies, which exposes sensitive internal system information instead of showing a generic err...

CVE-2024-28709

MEDIUM CVSS 6.1 Oct 7, 2024

A Cross-Site Scripting (XSS) vulnerability in LimeSurvey allows attackers to inject malicious scripts into title and comment fields. When executed, these scripts can steal session cookies, redirect us...

CVE-2024-6933

MEDIUM CVSS 6.3 Jul 21, 2024

This CVE describes a SQL injection vulnerability in LimeSurvey's survey general settings handler. Attackers can remotely exploit this flaw by manipulating language parameters to execute arbitrary SQL ...