expressionengine CVE Vulnerabilities & Metrics

Focus on expressionengine vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About expressionengine Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with expressionengine. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total expressionengine CVEs: 9
Earliest CVE date: 10 Jan 2008, 00:46 UTC
Latest CVE date: 16 Jun 2024, 15:15 UTC

Latest CVE reference: CVE-2024-38454

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical expressionengine CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.55

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 9
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS expressionengine CVEs

These are the five CVEs with the highest CVSS scores for expressionengine, sorted by severity first and recency.

All CVEs for expressionengine

ExpressionEngine before 7.4.11 allows XSS.

In ExpressionEngine before 7.2.6, remote code execution can be achieved by an authenticated Control Panel user.

CVE-2020-8242 expressionengine vulnerability CVSS: 6.5 18 Feb 2022, 18:15 UTC

Unsanitized user input in ExpressionEngine <= 5.4.0 control panel member creation leads to an SQL injection. The user needs member creation/admin control panel access to execute the attack.

CVE-2021-33199 expressionengine vulnerability CVSS: 7.5 12 Aug 2021, 21:15 UTC

In Expression Engine before 6.0.3, addonIcon in Addons/file/mod.file.php relies on the untrusted input value of input->get('file') instead of the fixed file names of icon.png and icon.svg.

CVE-2021-27230 expressionengine vulnerability CVSS: 6.5 15 Mar 2021, 23:15 UTC

ExpressionEngine before 5.4.2 and 6.x before 6.0.3 allows PHP Code Injection by certain authenticated users who can leverage Translate::save() to write to an _lang.php file under the system/user/language directory.

CVE-2020-13443 expressionengine vulnerability CVSS: 6.5 24 Jun 2020, 15:15 UTC

ExpressionEngine before 5.3.2 allows remote attackers to upload and execute arbitrary code in a .php%20 file via Compose Msg, Add attachment, and Save As Draft actions. A user with low privileges (member) is able to upload this. It is possible to bypass the MIME type check and file-extension check while uploading new files. Short aliases are not used for an attachment; instead, direct access is allowed to the uploaded files. It is possible to upload PHP only if one has member access, or registration/forum is enabled and one can create a member with the default group id of 5. To exploit this, one must to be able to send and compose messages (at least).

CVE-2018-17874 expressionengine vulnerability CVSS: 4.3 01 Oct 2018, 23:29 UTC

ExpressionEngine before 4.3.5 has reflected XSS.

CVE-2017-1000160 expressionengine vulnerability CVSS: 3.5 17 Nov 2017, 05:29 UTC

EllisLab ExpressionEngine 3.4.2 is vulnerable to cross-site scripting resulting in PHP code injection

CVE-2017-0897 expressionengine vulnerability CVSS: 5.0 22 Jun 2017, 21:29 UTC

ExpressionEngine version 2.x < 2.11.8 and version 3.x < 3.5.5 create an object signing token with weak entropy. Successfully guessing the token can lead to remote code execution.

CVE-2014-5387 expressionengine vulnerability CVSS: 6.5 04 Nov 2014, 15:55 UTC

Multiple SQL injection vulnerabilities in EllisLab ExpressionEngine before 2.9.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) column_filter or (2) category[] parameter to system/index.php or the (3) tbl_sort[0][] parameter in the comment module to system/index.php.

CVE-2009-1070 expressionengine vulnerability CVSS: 4.3 26 Mar 2009, 05:51 UTC

Cross-site scripting (XSS) vulnerability in system/index.php in ExpressionEngine 1.6.4 through 1.6.6, and possibly earlier versions, allows remote attackers to inject arbitrary web script or HTML via the avatar parameter.

CVE-2008-0201 expressionengine vulnerability CVSS: 4.3 10 Jan 2008, 00:46 UTC

Cross-site scripting (XSS) vulnerability in index.php in ExpressionEngine 1.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the URL parameter.

CVE-2008-0202 expressionengine vulnerability CVSS: 4.3 10 Jan 2008, 00:46 UTC

CRLF injection vulnerability in index.php in ExpressionEngine 1.2.1 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the URL parameter.