{"id":82520,"date":"2022-11-03T15:00:33","date_gmt":"2022-11-03T12:00:33","guid":{"rendered":"https:\/\/azbuki.bg\/?p=82520"},"modified":"2025-07-08T09:36:46","modified_gmt":"2025-07-08T06:36:46","slug":"security-analysis-on-content-management-systems","status":"publish","type":"post","link":"https:\/\/bel.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/","title":{"rendered":"Security Analysis on Content Management Systems"},"content":{"rendered":"<p><strong>1) Lilyana Petkova, 2) Vasilisa Pavlova<\/strong><br \/>\n<em>1)\u201cLiLuzeNet\u201d Ltd (Bulgaria)<\/em><br \/>\n<em>2)South-West University \u201cNeofit Rilski\u201d (Bulgaria)<\/em><\/p>\n<p><a href=\"https:\/\/doi.org\/10.53656\/math2022-5-2-sec\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/doi.org\/10.53656\/math2022-5-2-sec<\/a><\/p>\n<p><strong>Abstract.<\/strong> This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS like Umbraco, Sitecore, WordPress and Drupal categorized in two groups defined by the technology used for development. And as the IT world changes a lot these brings one constant battle against threats. Therefore, this article will add some vulnerabilities analysis of the selected systems since 2014. Results were grouped by common vulnerabilities of the selected platforms and such specific ones.<br \/>\n<em>Keywords:<\/em> CMS; web application; security; vulnerability<\/p>\n<a href=\"https:\/\/bel.azbuki.bg\/en\/member-login\/\">Log in to read the full text<\/a>","protected":false},"excerpt":{"rendered":"<p>1) Lilyana Petkova, 2) Vasilisa Pavlova 1)\u201cLiLuzeNet\u201d Ltd (Bulgaria) 2)South-West University \u201cNeofit Rilski\u201d (Bulgaria) https:\/\/doi.org\/10.53656\/math2022-5-2-sec Abstract. This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS [&hellip;]<\/p>","protected":false},"author":124332423426818,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"subtitle":"","format":"standard","video":"","gallery":"","source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"single_blog_custom":"","parallax":"0","fullscreen":"0","sidebar":"","second_sidebar":"","sticky_sidebar":"0","share_position":"","share_float_style":"","show_share_counter":"0","show_view_counter":"0","show_featured":"0","show_post_meta":"0","show_post_author":"0","show_post_author_image":"0","show_post_date":"0","post_date_format":"","post_date_format_custom":"","show_post_category":"0","show_post_reading_time":"0","post_reading_time_wpm":"","show_post_tag":"0","show_prev_next_post":"0","show_popup_post":"0","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"","single_post_gallery_size":""}],"trending_post":"0","trending_post_position":"","trending_post_label":""},"jnews_primary_category":{"id":""}},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Analysis on Content Management Systems - \u0410\u0437-\u0431\u0443\u043a\u0438<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Analysis on Content Management Systems - \u0410\u0437-\u0431\u0443\u043a\u0438\" \/>\n<meta property=\"og:description\" content=\"1) Lilyana Petkova, 2) Vasilisa Pavlova 1)\u201cLiLuzeNet\u201d Ltd (Bulgaria) 2)South-West University \u201cNeofit Rilski\u201d (Bulgaria) https:\/\/doi.org\/10.53656\/math2022-5-2-sec Abstract. This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0410\u0437-\u0431\u0443\u043a\u0438\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Azbuki55\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-03T12:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-08T06:36:46+00:00\" \/>\n<meta name=\"author\" content=\"v.genkov@azbuki.bg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"v.genkov@azbuki.bg\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/\"},\"author\":{\"name\":\"v.genkov@azbuki.bg\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/92cc38d6a11fb032bf6299efd22a71c5\"},\"headline\":\"Security Analysis on Content Management Systems\",\"datePublished\":\"2022-11-03T12:00:33+00:00\",\"dateModified\":\"2025-07-08T06:36:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/\"},\"wordCount\":157,\"publisher\":{\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#organization\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/\",\"url\":\"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/\",\"name\":\"Security Analysis on Content Management Systems - \u0410\u0437-\u0431\u0443\u043a\u0438\",\"isPartOf\":{\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#website\"},\"datePublished\":\"2022-11-03T12:00:33+00:00\",\"dateModified\":\"2025-07-08T06:36:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/strategies.azbuki.bg\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Analysis on Content Management Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#website\",\"url\":\"https:\/\/vocedu.azbuki.bg\/en\/\",\"name\":\"\u0410\u0437-\u0431\u0443\u043a\u0438\",\"description\":\"\u041d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u043d\u043e \u0438\u0437\u0434\u0430\u0442\u0435\u043b\u0441\u0442\u0432\u043e \u0437\u0430 \u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043d\u0430\u0443\u043a\u0430\",\"publisher\":{\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vocedu.azbuki.bg\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#organization\",\"name\":\"\u0410\u0437-\u0431\u0443\u043a\u0438\",\"url\":\"https:\/\/vocedu.azbuki.bg\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png\",\"contentUrl\":\"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png\",\"width\":250,\"height\":70,\"caption\":\"\u0410\u0437-\u0431\u0443\u043a\u0438\"},\"image\":{\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Azbuki55\/\",\"https:\/\/www.instagram.com\/nion_azbuki\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/92cc38d6a11fb032bf6299efd22a71c5\",\"name\":\"v.genkov@azbuki.bg\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3615ec69795d828958c71f5ecd30c623?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3615ec69795d828958c71f5ecd30c623?s=96&d=mm&r=g\",\"caption\":\"v.genkov@azbuki.bg\"},\"url\":\"https:\/\/bel.azbuki.bg\/en\/author\/v-genkovazbuki-bg\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Analysis on Content Management Systems - \u0410\u0437-\u0431\u0443\u043a\u0438","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/","og_locale":"en_US","og_type":"article","og_title":"Security Analysis on Content Management Systems - \u0410\u0437-\u0431\u0443\u043a\u0438","og_description":"1) Lilyana Petkova, 2) Vasilisa Pavlova 1)\u201cLiLuzeNet\u201d Ltd (Bulgaria) 2)South-West University \u201cNeofit Rilski\u201d (Bulgaria) https:\/\/doi.org\/10.53656\/math2022-5-2-sec Abstract. This paper is dedicated to the challenges of the use of the most popular content management systems (CMS) in software development. Fundamental information about the selected CMS platforms and vulnerability analysis are introduced. The review is made on CMS [&hellip;]","og_url":"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/","og_site_name":"\u0410\u0437-\u0431\u0443\u043a\u0438","article_publisher":"https:\/\/www.facebook.com\/Azbuki55\/","article_published_time":"2022-11-03T12:00:33+00:00","article_modified_time":"2025-07-08T06:36:46+00:00","author":"v.genkov@azbuki.bg","twitter_card":"summary_large_image","twitter_misc":{"Written by":"v.genkov@azbuki.bg","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/#article","isPartOf":{"@id":"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/"},"author":{"name":"v.genkov@azbuki.bg","@id":"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/92cc38d6a11fb032bf6299efd22a71c5"},"headline":"Security Analysis on Content Management Systems","datePublished":"2022-11-03T12:00:33+00:00","dateModified":"2025-07-08T06:36:46+00:00","mainEntityOfPage":{"@id":"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/"},"wordCount":157,"publisher":{"@id":"https:\/\/vocedu.azbuki.bg\/en\/#organization"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/","url":"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/","name":"Security Analysis on Content Management Systems - \u0410\u0437-\u0431\u0443\u043a\u0438","isPartOf":{"@id":"https:\/\/vocedu.azbuki.bg\/en\/#website"},"datePublished":"2022-11-03T12:00:33+00:00","dateModified":"2025-07-08T06:36:46+00:00","breadcrumb":{"@id":"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/foreignlanguages.azbuki.bg\/en\/uncategorized\/security-analysis-on-content-management-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/strategies.azbuki.bg\/"},{"@type":"ListItem","position":2,"name":"Security Analysis on Content Management Systems"}]},{"@type":"WebSite","@id":"https:\/\/vocedu.azbuki.bg\/en\/#website","url":"https:\/\/vocedu.azbuki.bg\/en\/","name":"\u0410\u0437-\u0431\u0443\u043a\u0438","description":"\u041d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u043d\u043e \u0438\u0437\u0434\u0430\u0442\u0435\u043b\u0441\u0442\u0432\u043e \u0437\u0430 \u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u043d\u0430\u0443\u043a\u0430","publisher":{"@id":"https:\/\/vocedu.azbuki.bg\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vocedu.azbuki.bg\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/vocedu.azbuki.bg\/en\/#organization","name":"\u0410\u0437-\u0431\u0443\u043a\u0438","url":"https:\/\/vocedu.azbuki.bg\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/logo\/image\/","url":"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png","contentUrl":"https:\/\/azbuki.bg\/wp-content\/uploads\/2019\/04\/logo-azbuki-e1580374651845.png","width":250,"height":70,"caption":"\u0410\u0437-\u0431\u0443\u043a\u0438"},"image":{"@id":"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Azbuki55\/","https:\/\/www.instagram.com\/nion_azbuki\/"]},{"@type":"Person","@id":"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/92cc38d6a11fb032bf6299efd22a71c5","name":"v.genkov@azbuki.bg","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vocedu.azbuki.bg\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3615ec69795d828958c71f5ecd30c623?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3615ec69795d828958c71f5ecd30c623?s=96&d=mm&r=g","caption":"v.genkov@azbuki.bg"},"url":"https:\/\/bel.azbuki.bg\/en\/author\/v-genkovazbuki-bg\/"}]}},"_links":{"self":[{"href":"https:\/\/bel.azbuki.bg\/en\/wp-json\/wp\/v2\/posts\/82520"}],"collection":[{"href":"https:\/\/bel.azbuki.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bel.azbuki.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bel.azbuki.bg\/en\/wp-json\/wp\/v2\/users\/124332423426818"}],"replies":[{"embeddable":true,"href":"https:\/\/bel.azbuki.bg\/en\/wp-json\/wp\/v2\/comments?post=82520"}],"version-history":[{"count":3,"href":"https:\/\/bel.azbuki.bg\/en\/wp-json\/wp\/v2\/posts\/82520\/revisions"}],"predecessor-version":[{"id":158263,"href":"https:\/\/bel.azbuki.bg\/en\/wp-json\/wp\/v2\/posts\/82520\/revisions\/158263"}],"wp:attachment":[{"href":"https:\/\/bel.azbuki.bg\/en\/wp-json\/wp\/v2\/media?parent=82520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bel.azbuki.bg\/en\/wp-json\/wp\/v2\/categories?post=82520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bel.azbuki.bg\/en\/wp-json\/wp\/v2\/tags?post=82520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}