dotcms CVE Vulnerabilities & Metrics

Focus on dotcms vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About dotcms Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with dotcms. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total dotcms CVEs: 50
Earliest CVE date: 21 May 2008, 13:24 UTC
Latest CVE date: 25 Jul 2024, 22:15 UTC

Latest CVE reference: CVE-2024-3938

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical dotcms CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.7

Max CVSS: 10.0

Critical CVEs (≥9): 3

CVSS Range vs. Count

Range Count
0.0-3.9 17
4.0-6.9 30
7.0-8.9 4
9.0-10.0 3

CVSS Distribution Chart

Top 5 Highest CVSS dotcms CVEs

These are the five CVEs with the highest CVSS scores for dotcms, sorted by severity first and recency.

All CVEs for dotcms

CVE-2024-3938 dotcms vulnerability CVSS: 0 25 Jul 2024, 22:15 UTC

The "reset password" login page accepted an HTML injection via URL parameters. This has already been rectified via patch, and as such it cannot be demonstrated via Demo site link. Those interested to see the vulnerability may spin up a http://localhost:8082/dotAdmin/#/public/login?resetEmailSent=true&resetEmail=%3Ch1%3E%3Ca%20href%3D%22https:%2F%2Fgoogle.com%22%3ECLICK%20ME%3C%2Fa%3E%3C%2Fh1%3E This will result in a view along these lines: * OWASP Top 10 - A03: Injection * CVSS Score: 5.4 * AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator * https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N&... https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator

CVE-2023-3042 dotcms vulnerability CVSS: 0 17 Oct 2023, 23:15 UTC

In dotCMS, versions mentioned, a flaw in the NormalizationFilter does not strip double slashes (//) from URLs, potentially enabling bypasses for XSS and access controls. An example affected URL is https://demo.dotcms.com//html/portlet/ext/files/edit_text_inc.jsp , which should return a 404 response but didn't. The oversight in the default invalid URL character list can be viewed at the provided GitHub link https://github.com/dotCMS/core/blob/master/dotCMS/src/main/java/com/dotcms/filters/NormalizationFilter.java#L37 .  To mitigate, users can block URLs with double slashes at firewalls or utilize dotCMS config variables. Specifically, they can use the DOT_URI_NORMALIZATION_FORBIDDEN_STRINGS environmental variable to add // to the list of invalid strings. Additionally, the DOT_URI_NORMALIZATION_FORBIDDEN_REGEX variable offers more detailed control, for instance, to block //html.* URLs. Fix Version:23.06+, LTS 22.03.7+, LTS 23.01.4+

CVE-2022-37034 dotcms vulnerability CVSS: 0 01 Feb 2023, 23:15 UTC

In dotCMS 5.x-22.06, it is possible to call the TempResource multiple times, each time requesting the dotCMS server to download a large file. If done repeatedly, this will result in Tomcat request-thread exhaustion and ultimately a denial of any other requests.

CVE-2022-45783 dotcms vulnerability CVSS: 0 01 Feb 2023, 22:15 UTC

An issue was discovered in dotCMS core 4.x through 22.10.2. An authenticated directory traversal vulnerability in the dotCMS API can lead to Remote Code Execution.

CVE-2022-45782 dotcms vulnerability CVSS: 0 01 Feb 2023, 22:15 UTC

An issue was discovered in dotCMS core 5.3.8.5 through 5.3.8.15 and 21.03 through 22.10.1. A cryptographically insecure random generation algorithm for password-reset token generation leads to account takeover.

CVE-2022-37033 dotcms vulnerability CVSS: 0 01 Feb 2023, 22:15 UTC

In dotCMS 5.x-22.06, TempFileAPI allows a user to create a temporary file based on a passed in URL, while attempting to block any SSRF access to local IP addresses or private subnets. In resolving this URL, the TempFileAPI follows any 302 redirects that the remote URL returns. Because there is no re-validation of the redirect URL, the TempFileAPI can be used to return data from those local/private hosts that should not be accessible remotely.

CVE-2022-35740 dotcms vulnerability CVSS: 0 10 Nov 2022, 21:15 UTC

dotCMS before 22.06 allows remote attackers to bypass intended access control and obtain sensitive information by using a semicolon in a URL to introduce a matrix parameter. (This is also fixed in 5.3.8.12, 21.06.9, and 22.03.2 for LTS users.) Some Java application frameworks, including those used by Spring or Tomcat, allow the use of matrix parameters: these are URI parameters separated by semicolons. Through precise semicolon placement in a URI, it is possible to exploit this feature to avoid dotCMS's path-based XSS prevention (such as "require login" filters), and consequently access restricted resources. For example, an attacker could place a semicolon immediately before a / character that separates elements of a filesystem path. This could reveal file content that is ordinarily only visible to signed-in users. This issue can be chained with other exploit code to achieve XSS attacks against dotCMS.

CVE-2022-37431 dotcms vulnerability CVSS: 0 05 Aug 2022, 06:15 UTC

A Reflected Cross-site scripting (XSS) issue was discovered in dotCMS Core through 22.06. This occurs in the admin portal when the configuration has XSS_PROTECTION_ENABLED=false. NOTE: the vendor disputes this because the current product behavior, in effect, has XSS_PROTECTION_ENABLED=true in all configurations

CVE-2022-26352 dotcms vulnerability CVSS: 6.8 17 Jul 2022, 22:15 UTC

An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution.

CVE-2020-19138 dotcms vulnerability CVSS: 10.0 08 Sep 2021, 21:15 UTC

Unrestricted Upload of File with Dangerous Type in DotCMS v5.2.3 and earlier allow remote attackers to execute arbitrary code via the component "/src/main/java/com/dotmarketing/filters/CMSFilter.java".

CVE-2020-18875 dotcms vulnerability CVSS: 6.5 18 Aug 2021, 17:15 UTC

Incorrect Access Control in DotCMS versions before 5.1 allows remote attackers to gain privileges by injecting client configurations via vtl (velocity) files.

CVE-2021-35361 dotcms vulnerability CVSS: 3.5 09 Jul 2021, 22:15 UTC

A reflected cross site scripting (XSS) vulnerability in dotAdmin/#/c/links of dotCMS 21.05.1 allows attackers to execute arbitrary commands or HTML via a crafted payload.

CVE-2021-35360 dotcms vulnerability CVSS: 3.5 09 Jul 2021, 22:15 UTC

A reflected cross site scripting (XSS) vulnerability in dotAdmin/#/c/containers of dotCMS 21.05.1 allows attackers to execute arbitrary commands or HTML via a crafted payload.

CVE-2021-35358 dotcms vulnerability CVSS: 3.5 09 Jul 2021, 22:15 UTC

A stored cross site scripting (XSS) vulnerability in dotAdmin/#/c/c_Images of dotCMS 21.05.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Title' and 'Filename' parameters.

CVE-2020-17542 dotcms vulnerability CVSS: 3.5 23 Apr 2021, 21:15 UTC

Cross Site Scripting (XSS) in dotCMS v5.1.5 allows remote attackers to execute arbitrary code by injecting a malicious payload into the "Task Detail" comment window of the "/dotAdmin/#/c/workflow" component.

CVE-2020-27848 dotcms vulnerability CVSS: 6.5 30 Dec 2020, 19:15 UTC

dotCMS before 20.10.1 allows SQL injection, as demonstrated by the /api/v1/containers orderby parameter. The PaginatorOrdered classes that are used to paginate results of a REST endpoints do not sanitize the orderBy parameter and in some cases it is vulnerable to SQL injection attacks. A user must be an authenticated manager in the dotCMS system to exploit this vulnerability.

CVE-2020-35274 dotcms vulnerability CVSS: 3.5 21 Dec 2020, 15:15 UTC

DotCMS Add Template with admin panel 20.11 is affected by cross-site Scripting (XSS) to gain remote privileges. An attacker could compromise the security of a website or web application through a stored XSS attack and stealing cookies using XSS.

CVE-2020-6754 dotcms vulnerability CVSS: 7.5 05 Feb 2020, 17:15 UTC

dotCMS before 5.2.4 is vulnerable to directory traversal, leading to incorrect access control. It allows an attacker to read or execute files under $TOMCAT_HOME/webapps/ROOT/assets (which should be a protected directory). Additionally, attackers can upload temporary files (e.g., .jsp files) into /webapps/ROOT/assets/tmp_upload, which can lead to remote command execution (with the permissions of the user running the dotCMS application).

CVE-2019-12872 dotcms vulnerability CVSS: 6.5 18 Jun 2019, 14:15 UTC

dotCMS before 5.1.6 is vulnerable to a SQL injection that can be exploited by an attacker of the role Publisher via view_unpushed_bundles.jsp.

CVE-2019-12309 dotcms vulnerability CVSS: 4.0 23 May 2019, 20:29 UTC

dotCMS before 5.1.0 has a path traversal vulnerability exploitable by an administrator to create files. The vulnerability is caused by the insecure extraction of a ZIP archive.

CVE-2019-11846 dotcms vulnerability CVSS: 4.3 14 May 2019, 18:29 UTC

/servlets/ajax_file_upload?fieldName=binary3 in dotCMS 5.1.1 allows XSS and HTML Injection.

CVE-2018-17422 dotcms vulnerability CVSS: 5.8 07 Mar 2019, 23:29 UTC

dotCMS before 5.0.2 has open redirects via the html/common/forward_js.jsp FORWARD_URL parameter or the html/portlet/ext/common/page_preview_popup.jsp hostname parameter.

CVE-2018-19554 dotcms vulnerability CVSS: 3.5 26 Nov 2018, 07:29 UTC

An issue was discovered in Dotcms through 5.0.3. Attackers may perform XSS attacks via the inode, identifier, or fieldName parameter in html/js/dotcms/dijit/image/image_tool.jsp.

CVE-2018-16980 dotcms vulnerability CVSS: 4.3 12 Sep 2018, 23:29 UTC

dotCMS V5.0.1 has XSS in the /html/portlet/ext/contentlet/image_tools/index.jsp fieldName and inode parameters.

CVE-2017-3189 dotcms vulnerability CVSS: 9.3 24 Jul 2018, 15:29 UTC

The dotCMS administration panel, versions 3.7.1 and earlier, "Push Publishing" feature in Enterprise Pro is vulnerable to arbitrary file upload. When "Bundle" tar.gz archives uploaded to the Push Publishing feature are decompressed, there are no checks on the types of files which the bundle contains. This vulnerability combined with the path traversal vulnerability (CVE-2017-3188) can lead to remote command execution with the permissions of the user running the dotCMS application. An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application.

CVE-2017-3188 dotcms vulnerability CVSS: 4.0 24 Jul 2018, 15:29 UTC

The dotCMS administration panel, versions 3.7.1 and earlier, "Push Publishing" feature in Enterprise Pro is vulnerable to path traversal. When "Bundle" tar.gz archives uploaded to the Push Publishing feature are decompressed, the filenames of its contents are not properly checked, allowing for writing files to arbitrary directories on the file system. These archives may be uploaded directly via the administrator panel, or using the CSRF vulnerability (CVE-2017-3187). An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application.

CVE-2017-3187 dotcms vulnerability CVSS: 6.8 24 Jul 2018, 15:29 UTC

The dotCMS administration panel, versions 3.7.1 and earlier, are vulnerable to cross-site request forgery. The dotCMS administrator panel contains a cross-site request forgery (CSRF) vulnerability. An attacker can perform actions with the same permissions as a victim user, provided the victim has an active session and is induced to trigger the malicious request. An unauthenticated remote attacker may perform actions with the dotCMS administrator panel with the same permissions of a victim user or execute arbitrary system commands with the permissions of the user running the dotCMS application.

CVE-2016-10008 dotcms vulnerability CVSS: 6.5 19 Feb 2018, 21:29 UTC

SQL injection vulnerability in the "Content Types > Content Types" screen in dotCMS before 3.7.2 and 4.x before 4.1.1 allows remote authenticated administrators to execute arbitrary SQL commands via the _EXT_STRUCTURE_direction parameter.

CVE-2016-10007 dotcms vulnerability CVSS: 6.5 19 Feb 2018, 21:29 UTC

SQL injection vulnerability in the "Marketing > Forms" screen in dotCMS before 3.7.2 and 4.x before 4.1.1 allows remote authenticated administrators to execute arbitrary SQL commands via the _EXT_FORM_HANDLER_orderBy parameter.

CVE-2017-15219 dotcms vulnerability CVSS: 3.5 10 Oct 2017, 21:29 UTC

The dotCMS 4.1.1 application is vulnerable to Stored Cross-Site Scripting (XSS) affecting a vanity-urls Title field, a containers Description field, and a templates Description field.

CVE-2017-11466 dotcms vulnerability CVSS: 9.0 20 Jul 2017, 00:29 UTC

Arbitrary file upload vulnerability in com/dotmarketing/servlets/AjaxFileUploadServlet.class in dotCMS 4.1.1 allows remote authenticated administrators to upload .jsp files to arbitrary locations via directory traversal sequences in the fieldName parameter to servlets/ajax_file_upload. This results in arbitrary code execution by requesting the .jsp file at a /assets URI.

CVE-2017-6003 dotcms vulnerability CVSS: 4.3 27 Mar 2017, 02:59 UTC

dotCMS 3.7.0 has XSS reachable from ext/languages_manager/edit_language in portal/layout via the bottom two form fields.

CVE-2017-5344 dotcms vulnerability CVSS: 7.5 17 Feb 2017, 07:59 UTC

An issue was discovered in dotCMS through 3.6.1. The findChildrenByFilter() function which is called by the web accessible path /categoriesServlet performs string interpolation and direct SQL query execution. SQL quote escaping and a keyword blacklist were implemented in a new class, SQLUtil (main/java/com/dotmarketing/common/util/SQLUtil.java), as part of the remediation of CVE-2016-8902; however, these can be overcome in the case of the q and inode parameters to the /categoriesServlet path. Overcoming these controls permits a number of blind boolean SQL injection vectors in either parameter. The /categoriesServlet web path can be accessed remotely and without authentication in a default dotCMS deployment.

CVE-2017-5877 dotcms vulnerability CVSS: 4.3 06 Feb 2017, 15:59 UTC

XSS was discovered in dotCMS 3.7.0, with an unauthenticated attack against the /about-us/locations/index direction parameter.

CVE-2017-5876 dotcms vulnerability CVSS: 4.3 06 Feb 2017, 15:59 UTC

XSS was discovered in dotCMS 3.7.0, with an unauthenticated attack against the /news-events/events date parameter.

CVE-2017-5875 dotcms vulnerability CVSS: 3.5 06 Feb 2017, 15:59 UTC

XSS was discovered in dotCMS 3.7.0, with an authenticated attack against the /myAccount addressID parameter.

CVE-2016-2355 dotcms vulnerability CVSS: 7.5 19 Dec 2016, 22:59 UTC

SQL injection vulnerability in the REST API in dotCMS before 3.3.2 allows remote attackers to execute arbitrary SQL commands via the stName parameter to api/content/save/1.

CVE-2016-8908 dotcms vulnerability CVSS: 6.5 14 Nov 2016, 23:20 UTC

SQL injection vulnerability in the "Site Browser > HTML pages" screen in dotCMS before 3.3.1 allows remote authenticated attackers to execute arbitrary SQL commands via the orderby parameter.

CVE-2016-8907 dotcms vulnerability CVSS: 6.5 14 Nov 2016, 23:20 UTC

SQL injection vulnerability in the "Content Types > Content Types" screen in dotCMS before 3.3.1 allows remote authenticated attackers to execute arbitrary SQL commands via the orderby parameter.

CVE-2016-8906 dotcms vulnerability CVSS: 6.5 14 Nov 2016, 23:20 UTC

SQL injection vulnerability in the "Site Browser > Links pages" screen in dotCMS before 3.3.1 allows remote authenticated attackers to execute arbitrary SQL commands via the orderby parameter.

CVE-2016-8905 dotcms vulnerability CVSS: 6.5 14 Nov 2016, 23:20 UTC

SQL injection vulnerability in the JSONTags servlet in dotCMS before 3.3.1 allows remote authenticated attackers to execute arbitrary SQL commands via the sort parameter.

CVE-2016-8904 dotcms vulnerability CVSS: 6.5 14 Nov 2016, 23:20 UTC

SQL injection vulnerability in the "Site Browser > Containers pages" screen in dotCMS before 3.3.1 allows remote authenticated attackers to execute arbitrary SQL commands via the orderby parameter.

CVE-2016-8903 dotcms vulnerability CVSS: 6.5 14 Nov 2016, 23:20 UTC

SQL injection vulnerability in the "Site Browser > Templates pages" screen in dotCMS before 3.3.1 allows remote authenticated attackers to execute arbitrary SQL commands via the orderby parameter.

CVE-2016-8902 dotcms vulnerability CVSS: 7.5 14 Nov 2016, 23:20 UTC

SQL injection vulnerability in the categoriesServlet servlet in dotCMS before 3.3.1 allows remote not authenticated attackers to execute arbitrary SQL commands via the sort parameter.

CVE-2016-8600 dotcms vulnerability CVSS: 5.0 28 Oct 2016, 15:59 UTC

In dotCMS 3.2.1, attacker can load captcha once, fill it with correct value and then this correct value is ok for forms with captcha check later.

CVE-2016-4803 dotcms vulnerability CVSS: 5.0 30 Jun 2016, 17:59 UTC

CRLF injection vulnerability in the send email functionality in dotCMS before 3.3.2 allows remote attackers to inject arbitrary email headers via CRLF sequences in the subject.

CVE-2016-4040 dotcms vulnerability CVSS: 6.5 19 Apr 2016, 14:59 UTC

SQL injection vulnerability in the Workflow Screen in dotCMS before 3.3.2 allows remote administrators to execute arbitrary SQL commands via the orderby parameter.

CVE-2016-3688 dotcms vulnerability CVSS: 4.0 19 Apr 2016, 14:59 UTC

SQL injection vulnerability in dotCMS before 3.5 allows remote administrators to execute arbitrary SQL commands via the c0-e3 parameter to dwr/call/plaincall/UserAjax.getUsersList.dwr.

CVE-2016-3972 dotcms vulnerability CVSS: 4.0 18 Apr 2016, 15:59 UTC

Directory traversal vulnerability in the dotTailLogServlet in dotCMS before 3.5.1 allows remote authenticated administrators to read arbitrary files via a .. (dot dot) in the fileName parameter.

CVE-2016-3971 dotcms vulnerability CVSS: 3.5 18 Apr 2016, 15:59 UTC

Cross-site scripting (XSS) vulnerability in lucene_search.jsp in dotCMS before 3.5.1 allows remote attackers to inject arbitrary web script or HTML via the query parameter to c/portal/layout.

CVE-2013-3484 dotcms vulnerability CVSS: 4.3 02 Apr 2014, 16:17 UTC

Multiple cross-site scripting (XSS) vulnerabilities in dotCMS before 2.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) _loginUserName parameter to application/login/login.html, (2) my_account_login parameter to c/portal_public/login, or (3) email parameter to forgotPassword.

CVE-2012-1826 dotcms vulnerability CVSS: 6.0 08 Jun 2012, 16:55 UTC

dotCMS 1.9 before 1.9.5.1 allows remote authenticated users to execute arbitrary Java code via a crafted (1) XSLT or (2) Velocity template.

CVE-2008-3708 dotcms vulnerability CVSS: 4.3 19 Aug 2008, 19:41 UTC

Multiple directory traversal vulnerabilities in dotCMS 1.6.0.9 allow remote attackers to read arbitrary files via a .. (dot dot) in the id parameter to (1) news/index.dot and (2) getting_started/macros/macros_detail.dot.

CVE-2008-2397 dotcms vulnerability CVSS: 4.3 21 May 2008, 13:24 UTC

Cross-site scripting (XSS) vulnerability in search-results.dot in dotCMS 1.x allows remote attackers to inject arbitrary web script or HTML via the search_query parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.