Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
semcms Vendor: sem-cms

About This Product

semcms is a software product offered by sem-cms. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 59 known vulnerabilities affecting sem-cms semcms. This includes 20 critical-severity issues and 10 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2018 to 2026, indicating a sustained research interest and ongoing security attention. 28 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2018-18738 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18739 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18740 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18741 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18742 2018-10-29 2024-11-21 8.8 6.8 Likely
CVE-2018-18743 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18744 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18745 2018-10-29 2024-11-21 4.8 3.5 Unknown
CVE-2018-18783 2018-10-29 2024-11-21 6.1 4.3 Likely
CVE-2018-18840 2018-10-30 2024-11-21 5.4 3.5 Unknown
CVE-2018-18841 2018-10-30 2024-11-21 4.8 3.5 Unknown
CVE-2018-20017 2018-12-10 2024-11-21 4.8 3.5 Unknown
CVE-2019-11518 2019-04-25 2024-11-21 7.2 6.5 Likely
CVE-2020-18078 2021-12-17 2024-11-21 9.8 5.0 Likely
CVE-2020-18081 2021-12-17 2024-11-21 7.5 5.0 Likely
CVE-2022-2726 2022-08-09 2024-11-21 6.3 - -
CVE-2021-38734 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38736 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38737 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38217 2022-10-28 2025-05-08 9.8 - -
CVE-2021-38728 2022-10-28 2025-05-07 6.1 - -
CVE-2021-38729 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38730 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38731 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38732 2022-10-28 2025-05-07 9.8 - -
CVE-2021-38733 2022-10-28 2025-05-07 9.8 - -
CVE-2023-30090 2023-05-05 2025-01-29 9.8 - -
CVE-2023-31707 2023-05-19 2025-01-21 9.8 - -
CVE-2020-18432 2023-06-30 2024-11-21 9.8 - -
CVE-2023-37647 2023-07-31 2024-11-21 9.8 - -
CVE-2020-23564 2023-08-05 2024-11-21 7.2 - -
CVE-2023-48863 2023-12-04 2025-06-03 7.5 - -
CVE-2023-50563 2023-12-14 2024-11-21 9.8 - -
CVE-2023-48864 2024-01-10 2025-06-20 7.5 - -
CVE-2024-25422 2024-02-28 2025-03-29 9.8 - -
CVE-2024-28405 2024-03-29 2025-04-04 7.2 - -
CVE-2024-31009 2024-04-03 2025-04-04 6.5 - -
CVE-2024-31010 2024-04-03 2025-04-04 7.5 - -
CVE-2024-31012 2024-04-03 2025-04-04 9.8 - -
CVE-2024-30938 2024-04-19 2025-04-04 9.8 - -
CVE-2024-32409 2024-04-19 2025-04-04 7.1 - -
CVE-2024-4595 2024-05-07 2025-04-04 6.3 6.5 Likely
CVE-2024-36800 2024-06-04 2025-04-03 7.5 - -
CVE-2024-36801 2024-06-04 2025-04-03 5.9 - -
CVE-2024-46103 2024-09-20 2025-04-04 9.8 - -
CVE-2024-52725 2024-11-20 2025-04-04 4.9 - -
CVE-2024-53502 2024-12-03 2025-04-04 3.8 - -
CVE-2024-13193 2025-01-08 2025-04-04 6.3 6.5 Likely
CVE-2025-25686 2025-03-27 2025-04-11 9.8 - -
CVE-2025-51652 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51653 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51654 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51655 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51656 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51657 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51658 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51659 2025-07-14 2025-07-15 5.4 - -
CVE-2025-51660 2025-07-14 2025-07-15 5.4 - -
CVE-2026-1552 2026-01-29 2026-02-09 6.3 6.5 Likely

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for sem-cms semcms by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.