totaljs CVE Vulnerabilities & Metrics

Focus on totaljs vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About totaljs Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with totaljs. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total totaljs CVEs: 23
Earliest CVE date: 18 Feb 2019, 16:29 UTC
Latest CVE date: 04 May 2023, 20:15 UTC

Latest CVE reference: CVE-2023-30097

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical totaljs CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.97

Max CVSS: 9.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 10
4.0-6.9 7
7.0-8.9 5
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS totaljs CVEs

These are the five CVEs with the highest CVSS scores for totaljs, sorted by severity first and recency.

All CVEs for totaljs

CVE-2023-30097 totaljs vulnerability CVSS: 0 04 May 2023, 20:15 UTC

A stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the private task field.

CVE-2023-30096 totaljs vulnerability CVSS: 0 04 May 2023, 20:15 UTC

A stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the user information field.

CVE-2023-30095 totaljs vulnerability CVSS: 0 04 May 2023, 20:15 UTC

A stored cross-site scripting (XSS) vulnerability in TotalJS messenger commit b6cf1c9 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the channel description field.

CVE-2023-30094 totaljs vulnerability CVSS: 0 04 May 2023, 20:15 UTC

A stored cross-site scripting (XSS) vulnerability in TotalJS Flow v10 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the platform name field in the settings module.

CVE-2023-27070 totaljs vulnerability CVSS: 0 14 Mar 2023, 16:15 UTC

A stored cross-site scripting (XSS) vulnerability in TotalJS OpenPlatform commit b80b09d allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the platform name field.

CVE-2023-27069 totaljs vulnerability CVSS: 0 14 Mar 2023, 16:15 UTC

A stored cross-site scripting (XSS) vulnerability in TotalJS OpenPlatform commit b80b09d allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the account name field.

CVE-2022-44019 totaljs vulnerability CVSS: 0 30 Oct 2022, 00:15 UTC

In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote command execution via shell metacharacters in the host parameter.

CVE-2022-41392 totaljs vulnerability CVSS: 0 07 Oct 2022, 19:15 UTC

A cross-site scripting (XSS) vulnerability in TotalJS commit 8c2c8909 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Website name text field under Main Settings.

CVE-2022-30013 totaljs vulnerability CVSS: 3.5 16 May 2022, 14:15 UTC

A stored cross-site scripting (XSS) vulnerability in the upload function of totaljs CMS 3.4.5 allows attackers to execute arbitrary web scripts via a JavaScript embedded PDF file.

CVE-2022-26565 totaljs vulnerability CVSS: 3.5 01 Apr 2022, 22:15 UTC

A cross-site scripting (XSS) vulnerability in Totaljs all versions before commit 95f54a5commit, allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Page Name text field when creating a new page.

CVE-2021-32831 totaljs vulnerability CVSS: 6.5 30 Aug 2021, 21:15 UTC

Total.js framework (npm package total.js) is a framework for Node.js platfrom written in pure JavaScript similar to PHP's Laravel or Python's Django or ASP.NET MVC. In total.js framework before version 3.4.9, calling the utils.set function with user-controlled values leads to code-injection. This can cause a variety of impacts that include arbitrary code execution. This is fixed in version 3.4.9.

CVE-2021-23390 totaljs vulnerability CVSS: 7.5 12 Jul 2021, 16:15 UTC

The package total4 before 0.0.43 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.

CVE-2021-23389 totaljs vulnerability CVSS: 7.5 12 Jul 2021, 16:15 UTC

The package total.js before 3.4.9 are vulnerable to Arbitrary Code Execution via the U.set() and U.get() functions.

CVE-2021-23344 totaljs vulnerability CVSS: 7.5 04 Mar 2021, 17:15 UTC

The package total.js before 3.4.8 are vulnerable to Remote Code Execution (RCE) via set.

CVE-2020-28495 totaljs vulnerability CVSS: 7.5 02 Feb 2021, 11:15 UTC

This affects the package total.js before 3.4.7. The set function can be used to set a value into the object according to the path. However the keys of the path being set are not properly sanitized, leading to a prototype pollution vulnerability. The impact depends on the application. In some cases it is possible to achieve Denial of service (DoS), Remote Code Execution or Property Injection.

CVE-2020-28494 totaljs vulnerability CVSS: 7.5 02 Feb 2021, 11:15 UTC

This affects the package total.js before 3.4.7. The issue occurs in the image.pipe and image.stream functions. The type parameter is used to build the command that is then executed using child_process.spawn. The issue occurs because child_process.spawn is called with the option shell set to true and because the type parameter is not properly sanitized.

CVE-2020-9381 totaljs vulnerability CVSS: 5.0 24 Feb 2020, 22:15 UTC

controllers/admin.js in Total.js CMS 13 allows remote attackers to execute arbitrary code via a POST to the /admin/api/widgets/ URI. This can be exploited in conjunction with CVE-2019-15954.

CVE-2019-15955 totaljs vulnerability CVSS: 4.0 05 Sep 2019, 19:16 UTC

An issue was discovered in Total.js CMS 12.0.0. A low privilege user can perform a simple transformation of a cookie to obtain the random values inside it. If an attacker can discover a session cookie owned by an admin, then it is possible to brute force it with O(n)=2n instead of O(n)=n^x complexity, and steal the admin password.

CVE-2019-15954 totaljs vulnerability CVSS: 9.0 05 Sep 2019, 19:16 UTC

An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the widgets privilege can gain achieve Remote Command Execution (RCE) on the remote server by creating a malicious widget with a special tag containing JavaScript code that will be evaluated server side. In the process of evaluating the tag by the back-end, it is possible to escape the sandbox object by using the following payload: <script total>global.process.mainModule.require(child_process).exec(RCE);</script>

CVE-2019-15953 totaljs vulnerability CVSS: 6.5 05 Sep 2019, 19:16 UTC

An issue was discovered in Total.js CMS 12.0.0. An authenticated user with limited privileges can get access to a resource that they do not own by calling the associated API. The product correctly manages privileges only for the front-end resource path, not for API requests. This leads to vertical and horizontal privilege escalation.

CVE-2019-15952 totaljs vulnerability CVSS: 6.5 05 Sep 2019, 19:16 UTC

An issue was discovered in Total.js CMS 12.0.0. An authenticated user with the Pages privilege can conduct a path traversal attack (../) to include .html files that are outside the permitted directory. Also, if a page contains a template directive, then the directive will be server side processed. Thus, if a user can control the content of a .html file, then they can inject a payload with a malicious template directive to gain Remote Command Execution. The exploit will work only with the .html extension.

CVE-2019-10260 totaljs vulnerability CVSS: 4.3 28 Mar 2019, 17:29 UTC

Total.js CMS 12.0.0 has XSS related to themes/admin/views/index.html (item.message) and themes/admin/public/ui.js (column.format).

CVE-2019-8903 totaljs vulnerability CVSS: 5.0 18 Feb 2019, 16:29 UTC

index.js in Total.js Platform before 3.2.3 allows path traversal.