Filtered by vendor Perfree Subscriptions
Filtered by product Perfreeblog Subscriptions
Total 7 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-29280 1 Perfree 1 Perfreeblog 2025-06-24 4.8 Medium
Stored cross-site scripting vulnerability exists in PerfreeBlog v4.0.11 in the website name field of the backend system settings interface allows an attacker to insert and execute arbitrary malicious code.
CVE-2025-29281 1 Perfree 1 Perfreeblog 2025-06-24 8.8 High
In PerfreeBlog version 4.0.11, regular users can exploit the arbitrary file upload vulnerability in the attach component to upload arbitrary files and execute code within them.
CVE-2025-5164 1 Perfree 1 Perfreeblog 2025-06-03 3.7 Low
A vulnerability has been found in PerfreeBlog 4.0.11 and classified as problematic. This vulnerability affects the function JwtUtil of the component JWT Handler. The manipulation leads to use of hard-coded cryptographic key . The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
CVE-2023-27757 1 Perfree 1 Perfreeblog 2025-02-27 9.8 Critical
An arbitrary file upload vulnerability in the /admin/user/uploadImg component of PerfreeBlog v3.1.1 allows attackers to execute arbitrary code via a crafted JPG file.
CVE-2023-29643 1 Perfree 1 Perfreeblog 2025-01-30 5.4 Medium
Cross Site Scripting (XSS) vulnerability in PerfreeBlog 3.1.2 allows attackers to execute arbitrary code via the Post function.
CVE-2023-30333 1 Perfree 1 Perfreeblog 2025-01-23 9.8 Critical
An arbitrary file upload vulnerability in the component /admin/ThemeController.java of PerfreeBlog v3.1.2 allows attackers to execute arbitrary code via a crafted file.
CVE-2023-40825 1 Perfree 1 Perfreeblog 2024-11-21 7.2 High
An issue in Perfree PerfreeBlog v.3.1.2 allows a remote attacker to execute arbitrary code via crafted plugin listed in admin/plugin/access/list.