SecPod Research Team has found one LFI (Local File Inclusion) and XSS flaw in Openengine CMS, which can be used to obtain
potentially sensitive information and execute arbitrary HTML, script code in a user’s browser session in the context of an affected site. The flaw lies in the ‘template’ parameter in “cms/website.php” while the web application processes the user-supplied input and renders the content back to the client’s browser. The flaw can be exploited to inject arbitrary HTML codes and steal cookies and so on.
More information on the flaws can be found here.