pluxml CVE Vulnerabilities & Metrics

Focus on pluxml vulnerabilities and metrics.

Last updated: 08 Mar 2026, 23:25 UTC

About pluxml Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with pluxml. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total pluxml CVEs: 15
Earliest CVE date: 27 Jun 2007, 00:30 UTC
Latest CVE date: 27 Feb 2026, 12:16 UTC

Latest CVE reference: CVE-2026-24352

Rolling Stats

30-day Count (Rolling): 3
365-day Count (Rolling): 5

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical pluxml CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.64

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 12
4.0-6.9 5
7.0-8.9 3
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS pluxml CVEs

These are the five CVEs with the highest CVSS scores for pluxml, sorted by severity first and recency.

All CVEs for pluxml

CVE-2026-24352 pluxml vulnerability CVSS: 0 27 Feb 2026, 12:16 UTC

PluXml CMS allows a user's session identifier to be set before authentication. The value of this session ID stays the same after authentication. This behaviour enables an attacker to fix a session ID for a victim and later hijack the authenticated session. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

CVE-2026-24351 pluxml vulnerability CVSS: 0 27 Feb 2026, 12:16 UTC

PluXml CMS is vulnerable to Stored XSS in Static Pages editing functionality. Attacker with editing privileges can inject arbitrary HTML and JS into website, which will be rendered/executed when visiting edited page. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

CVE-2026-24350 pluxml vulnerability CVSS: 0 27 Feb 2026, 12:16 UTC

PluXml CMS is vulnerable to Stored XSS in file uploading functionality. An authenticated attacker can upload an SVG file containing a malicious payload, which will be executed when a victim clicks the link associated with the uploaded image. In version 5.9.0-rc7 clicking the link associated with the uploaded image doesn't execute malicious code but directly accessing the file will still execute the embedded payload. The vendor was notified early about this vulnerability, but didn't respond with the details of vulnerability or vulnerable version range. Only versions 5.8.21 and 5.9.0-rc7 were tested and confirmed as vulnerable, other versions were not tested and might also be vulnerable.

CVE-2025-15438 pluxml vulnerability CVSS: 5.8 02 Jan 2026, 15:15 UTC

A vulnerability was determined in PluXml up to 5.8.22. Affected is the function FileCookieJar::__destruct of the file core/admin/medias.php of the component Media Management Module. Executing a manipulation of the argument File can lead to deserialization. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was informed early about this issue and announced that "[w]e fix this issue in the next version 5.8.23". A patch for it is ready.

CVE-2025-67436 pluxml vulnerability CVSS: 0 22 Dec 2025, 22:16 UTC

Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).

CVE-2024-22636 pluxml vulnerability CVSS: 0 25 Jan 2024, 21:15 UTC

PluXml Blog v5.8.9 was discovered to contain a remote code execution (RCE) vulnerability in the Static Pages feature. This vulnerability is exploited via injecting a crafted payload into the Content field.

CVE-2022-25020 pluxml vulnerability CVSS: 3.5 01 Mar 2022, 02:15 UTC

A cross-site scripting (XSS) vulnerability in Pluxml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the thumbnail path of a blog post.

CVE-2022-25018 pluxml vulnerability CVSS: 6.5 01 Mar 2022, 02:15 UTC

Pluxml v5.8.7 was discovered to allow attackers to execute arbitrary code via crafted PHP code inserted into static pages.

CVE-2022-24587 pluxml vulnerability CVSS: 3.5 15 Feb 2022, 16:15 UTC

A stored cross-site scripting (XSS) vulnerability in the component core/admin/medias.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML.

CVE-2022-24585 pluxml vulnerability CVSS: 3.5 15 Feb 2022, 16:15 UTC

A stored cross-site scripting (XSS) vulnerability in the component /core/admin/comment.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the author parameter.

CVE-2022-24586 pluxml vulnerability CVSS: 3.5 15 Feb 2022, 14:15 UTC

A stored cross-site scripting (XSS) vulnerability in the component /core/admin/categories.php of PluXml v5.8.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content and thumbnail parameters.

CVE-2021-38603 pluxml vulnerability CVSS: 3.5 12 Aug 2021, 23:15 UTC

PluXML 5.8.7 allows core/admin/profil.php stored XSS via the Information field.

CVE-2021-38602 pluxml vulnerability CVSS: 3.5 12 Aug 2021, 23:15 UTC

PluXML 5.8.7 allows Article Editing stored XSS via Headline or Content.

CVE-2020-18185 pluxml vulnerability CVSS: 7.5 02 Oct 2020, 13:15 UTC

class.plx.admin.php in PluXml 5.7 allows attackers to execute arbitrary PHP code by modify the configuration file in a linux environment.

CVE-2017-1001001 pluxml vulnerability CVSS: 3.5 01 Nov 2017, 17:29 UTC

PluXml version 5.6 is vulnerable to stored cross-site scripting vulnerability, within the article creation page, which can result in escalation of privileges.

CVE-2012-4675 pluxml vulnerability CVSS: 4.3 26 Aug 2012, 18:55 UTC

Cross-site scripting (XSS) vulnerability in PluXml 5.1.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to file update.

CVE-2012-4674 pluxml vulnerability CVSS: 5.0 26 Aug 2012, 18:55 UTC

PluXml before 5.1.6 allows remote attackers to obtain the installation path via the PHPSESSID.

CVE-2012-2227 pluxml vulnerability CVSS: 7.5 26 Aug 2012, 18:55 UTC

Directory traversal vulnerability in update/index.php in PluXml before 5.1.6 allows remote attackers to include and execute arbitrary local files via a ..%2F (encoded dot dot slash) in the default_lang parameter.

CVE-2007-3542 pluxml vulnerability CVSS: 4.3 03 Jul 2007, 20:30 UTC

Cross-site scripting (XSS) vulnerability in admin/auth.php in Pluxml 0.3.1 allows remote attackers to inject arbitrary web script or HTML via the msg parameter.

CVE-2007-3432 pluxml vulnerability CVSS: 7.5 27 Jun 2007, 00:30 UTC

Unrestricted file upload vulnerability in admin/images.php in Pluxml 0.3.1 allows remote attackers to upload and execute arbitrary PHP code via a .jpg filename.