FUEL-CMS icon indicating copy to clipboard operation
FUEL-CMS copied to clipboard

A CodeIgniter Content Management System

Results 53 FUEL-CMS issues
Sort by recently updated
recently updated
newest added

On https://www.getfuelcms.com/support: This link for `Get in touch` leads to https://www.getfuelcms.com/forums/categories/feature-requests which is 404 at the moment. The correct link seems to be https://forum.getfuelcms.com/categories/feature-requests Maybe a link to either https://github.com/daylightstudio/FUEL-CMS/issues...

A HTML Injection issue is affecting the application. STEP 1: ![image](https://user-images.githubusercontent.com/97121933/158069702-a53ac07c-433d-4303-bd4f-2b64d0c479a4.png) STEP 2: ![image](https://user-images.githubusercontent.com/97121933/158069639-b3af4292-e84b-4b1e-8fcd-e0fa7c6626eb.png)

It would be nice to have a docker container with a docker compose to deploy the application easily. ## Related discussions - https://forum.getfuelcms.com/discussion/3168/setting-fuel-cms-up-in-docker

Hello 👋 I run a security community that finds and fixes vulnerabilities in OSS. A researcher (@ambientl) has found a potential issue, which I would be eager to share with...

A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1 that allows an authenticated user authorized to upload a malicious .pdf file which acts as a stored XSS payload. If this...

Windows defender is seeing this file as Backdoor:Win32/Dirtelti!ml Not sure what part of the PHP code is causing it, but it's problematic.

A stored cross-site scripting (XSS) vulnerability exists in FUEL-CMS-1.5.1 that allows an authenticated user authorized to upload a malicious .svg file which acts as a stored XSS payload. If this...

CSRF POC: ![image](https://user-images.githubusercontent.com/51786945/142441915-a9b0cfd1-38a2-4510-82f1-a08bd28f5c68.png) Affected Module ![image](https://user-images.githubusercontent.com/51786945/142442063-6a82bae7-346f-4138-8b0d-0dd9e96a7c03.png)