Learn how to report security issues - Read Ibexa's security policy - Check out our security blog posts
IBEXA-SA-2021-006: Storage and legacy files accessible if path is known
IBEXA-SA-2021-005: Content object state fetch functions open to SQL injection
IBEXA-SA-2021-004: Map/Host matcher exposes backend URL in the frontend
IBEXA-SA-2021-003: Block upload of scriptable file types
IBEXA-SA-2021-002: /user/sessions endpoint allows detecting valid accounts
IBEXA-SA-2021-001: SQL injection vulnerability in EcontentController
IBEXA-SA-2020-007: Failing access control in system info view
IBEXA-SA-2020-006: Object Injection in legacy shop module
EZSA-2020-005: Editor XSS, and trashed drafts in review queue