MODX Revolution version <=2.6.4 contains a Incorrect Access Control vulnerability in Filtering user parameters before passing them into phpthumb class that can result in Creating file with custom a filename and content. This attack appear to be exploitable via Web request. This vulnerability appears to have been fixed in commit 06bc94257408f6a575de20ddb955aca505ef6e68.
{ "nvd_published_at": "2018-07-13T18:29:00Z", "cwe_ids": [ "CWE-732" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-07-21T22:32:43Z" }