camaleon_cms 1.0.6

3 security vulnerabilities found in version 1.0.6

Server-Side Template Injection in Camaleon CMS

critical severity CVE-2023-30145
critical severity CVE-2023-30145
Patched versions: >= 2.7.4

Camaleon CMS prior to 2.7.4 was discovered to contain a Server-Side Template Injection (SSTI) vulnerability via the formats parameter.

Camaleon CMS Insufficient Session Expiration vulnerability

high severity CVE-2021-25970
high severity CVE-2021-25970
Patched versions: >= 2.6.0.1
Unaffected versions: < 0.1.7

Camaleon CMS 0.1.7 through 2.6.0 doesn’t terminate the active session of the users, even after the admin changes the user’s password. A user that was already logged in, will still have access to the application even after the password was changed.

Camaleon CMS Stored Cross-site Scripting vulnerability

medium severity CVE-2021-25969
medium severity CVE-2021-25969
Patched versions: >= 2.6.0.1
Unaffected versions: < 0.0.1

In “Camaleon CMS” application, versions 0.0.1 through 2.6.0 are vulnerable to stored XSS, that allows unprivileged application users to store malicious scripts in the comments section of the post. These scripts are executed in a victim’s browser when they open the page containing the malicious comment.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.