Focus on opencrx vulnerabilities and metrics.
Last updated: 08 Mar 2025, 23:25 UTC
This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with opencrx. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.
For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.
Total opencrx CVEs: 13
Earliest CVE date: 24 Nov 2020, 17:15 UTC
Latest CVE date: 26 Dec 2023, 04:15 UTC
Latest CVE reference: CVE-2023-27150
30-day Count (Rolling): 0
365-day Count (Rolling): 0
Calendar-based Variation
Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.
Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%
Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%
Average CVSS: 0.82
Max CVSS: 6.4
Critical CVEs (≥9): 0
Range | Count |
---|---|
0.0-3.9 | 11 |
4.0-6.9 | 2 |
7.0-8.9 | 0 |
9.0-10.0 | 0 |
These are the five CVEs with the highest CVSS scores for opencrx, sorted by severity first and recency.
openCRX 5.2.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the Name field after creation of a Tracker in Manage Activity.
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Product Configuration Name Field.
OpenCRX version 5.2.0 is vulnerable to HTML injection via Activity Milestone Name Field.
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Category Creation Name Field.
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Accounts Name Field.
OpenCRX version 5.2.0 is vulnerable to HTML injection via Activity Saved Search Creation.
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Accounts Group Name Field.
OpenCRX version 5.2.0 is vulnerable to HTML injection via Product Name Field.
OpenCRX version 5.2.0 is vulnerable to HTML injection via the Activity Search Criteria-Activity Number.
An issue in openCRX v.5.2.2 allows a remote attacker to read internal files and execute server side request forgery attack via insecure DocumentBuilderFactory.
OpenCRX before v5.2.2 was discovered to be vulnerable to password enumeration due to the difference in error messages received during a password reset which could enable an attacker to determine if a username, email or ID is valid.
In OpenCRX, versions v4.0.0 through v5.1.0 are vulnerable to reflected Cross-site Scripting (XSS), due to unsanitized parameters in the password reset functionality. This allows execution of external javascript files on any user of the openCRX instance.
CRIXP OpenCRX version 4.30 and 5.0-20200717 and prior suffers from an unverified password change vulnerability. An attacker who is able to connect to the affected OpenCRX instance can change the password of any user, including admin-Standard, to any chosen value. This issue was resolved in version 5.0-20200904, released September 4, 2020.