Browse all 4 CVE security advisories affecting camaleon_cms. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Camaleon CMS is a content management system designed for building websites and managing digital content. Historically, it has been susceptible to multiple security vulnerabilities including remote code execution, cross-site scripting, and privilege escalation. The platform has accumulated four CVE records, highlighting persistent security concerns. Notable characteristics include its open-source nature and frequent updates, though security incidents have been documented, particularly related to insufficient input validation and authentication bypass flaws. Organizations implementing this system should prioritize regular patching and security hardening to mitigate risks associated with its historical vulnerability profile.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2021-25972 | Camaleon CMS - Server-Side Request Forgery (SSRF) in Media Upload Feature — camaleon_cmsCWE-918 | 4.9 | Medium | 2021-10-20 |
| CVE-2021-25971 | Camaleon CMS - SVG File Upload Creates DoS for Media Upload Feature — camaleon_cmsCWE-248 | 4.3 | Medium | 2021-10-20 |
| CVE-2021-25970 | Camaleon CMS - Insufficient Session Expiration after Password Change — camaleon_cmsCWE-613 | 8.8 | High | 2021-10-20 |
| CVE-2021-25969 | Camaleon CMS - Stored Cross-Site Scripting (XSS) in Comments — camaleon_cmsCWE-79 | 6.1 | Medium | 2021-10-20 |
This page lists every published CVE security advisory associated with camaleon_cms. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.