Known Vulnerabilities for Sitefinity by Progress

Listed below are 9 of the newest known vulnerabilities associated with "Sitefinity" by "Progress".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2019-17392 Progress Sitefinity 12.1 has a Weak Password Recovery Mechanism for a Forgotten Password because the HTTP Host header is mish... 9.8 - CRITICAL 2019-11-26 2019-12-14
CVE-2019-7215 Progress Sitefinity 10.1.6536 does not invalidate session cookies upon logouts. It instead tries to overwrite the cookie in t... 6.5 - MEDIUM 2019-06-06 2023-11-07
CVE-2018-17055 An arbitrary file upload vulnerability in Progress Sitefinity CMS versions 4.0 through 11.0 related to image uploads. 7.5 - HIGH 2018-09-28 2018-12-12
CVE-2017-18179 Progress Sitefinity 9.1 uses wrap_access_token as a non-expiring authentication token that remains valid after a password cha... 8.8 - HIGH 2018-02-12 2018-03-05
CVE-2017-18178 Authenticate/SWT in Progress Sitefinity 9.1 has an open redirect issue in which an authentication token is sent to the redire... 6.1 - MEDIUM 2018-02-12 2018-03-05
CVE-2017-18177 Progress Sitefinity 9.1 has XSS via the Last name, First name, and About fields on the New User Creation Page. This is fixed ... 5.4 - MEDIUM 2018-02-12 2018-03-05
CVE-2017-18176 Progress Sitefinity 9.1 has XSS via file upload, because JavaScript code in an HTML file has the same origin as the applicati... 5.4 - MEDIUM 2018-02-12 2018-03-05
CVE-2017-18175 Progress Sitefinity 9.1 has XSS via the Content Management Template Configuration (aka Templateconfiguration), as demonstrate... 5.4 - MEDIUM 2018-02-12 2018-03-05
CVE-2017-15883 Sitefinity 5.1, 5.2, 5.3, 5.4, 6.x, 7.x, 8.x, 9.x, and 10.x allow remote attackers to bypass authentication and consequently ... 9.8 - CRITICAL 2018-01-08 2018-02-01

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationProgressSitefinity9.2.6276AllAllAll
ApplicationProgressSitefinity9.2.6274AllAllAll
ApplicationProgressSitefinity9.2AllAllAll
ApplicationProgressSitefinity9.1.6185AllAllAll
ApplicationProgressSitefinity9.1.6183AllAllAll
ApplicationProgressSitefinity9.1.6180AllAllAll
ApplicationProgressSitefinity9.1AllAllAll
ApplicationProgressSitefinity9.0.6063AllAllAll
ApplicationProgressSitefinity9.0AllAllAll
ApplicationProgressSitefinity8.2.5973AllAllAll
ApplicationProgressSitefinity8.2AllAllAll
ApplicationProgressSitefinity8.1.5863AllAllAll
ApplicationProgressSitefinity8.1AllAllAll
ApplicationProgressSitefinity8.0.5773AllAllAll
ApplicationProgressSitefinity8.0AllAllAll
ApplicationProgressSitefinity7.3.5693AllAllAll
ApplicationProgressSitefinity7.3AllAllAll
ApplicationProgressSitefinity7.2.5353AllAllAll
ApplicationProgressSitefinity7.2AllAllAll
ApplicationProgressSitefinity7.1.5243AllAllAll
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report