{"id":"CVE-2022-26149","details":"MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.","aliases":["GHSA-j8jp-9x42-4pj5"],"modified":"2026-04-10T04:46:08.305522Z","published":"2022-02-26T21:15:08.013Z","references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/171488/MODX-Revolution-2.8.3-pl-Remote-Code-Execution.html"},{"type":"EVIDENCE","url":"https://github.com/sartlabs/0days/blob/main/Modx/Exploit.txt"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/modxcms/revolution","events":[{"introduced":"0"},{"last_affected":"9f34bc936bcfa604d462a3f8b8fa3a36586b4395"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.8.3"}]}}],"versions":["v2.0.1-pl","v2.0.3-pl","v2.0.4-pl","v2.0.4-pl2","v2.0.5-pl","v2.0.6-pl","v2.0.7-pl","v2.0.8-pl","v2.1.0-pl","v2.1.0-rc1","v2.1.0-rc2","v2.1.0-rc3","v2.1.0-rc4","v2.1.1-pl","v2.1.2-pl","v2.1.3-pl","v2.1.4-pl","v2.1.5-pl","v2.2.0-pl","v2.2.0-pl2","v2.2.0-rc1","v2.2.0-rc2","v2.2.0-rc3","v2.2.1-pl","v2.2.10-pl","v2.2.11-pl","v2.2.12-pl","v2.2.13-pl","v2.2.14-pl","v2.2.15-pl","v2.2.2-pl","v2.2.3-pl","v2.2.4-pl","v2.2.5-pl","v2.2.6-pl","v2.2.7-pl","v2.2.8-pl","v2.2.9-pl","v2.3.0-pl","v2.3.1-pl","v2.3.2-pl","v2.3.3-pl","v2.3.4-pl","v2.3.5-pl","v2.3.6-pl","v2.4.1-pl","v2.4.2-pl","v2.5.0-pl","v2.5.0-rc1","v2.5.0-rc2","v2.6.0-pl","v2.6.1-pl","v2.7.0-pl","v2.7.1-pl","v2.7.2-pl","v2.7.3-pl","v2.8.0-pl","v2.8.1-pl","v2.8.2-pl","v2.8.3-pl"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-26149.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}