Vulnerabilità WordPress (qui elenco plugin) fonte: NIST CVES
- CVE-2024-13011 -- 2025-02-10T19:15:37.440
Received- The WP Foodbakery Plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'upload_publisher_profile_image' function in versions up to, and including, 4.7.
- This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. - CVE-2024-13010 -- 2025-02-10T19:15:37.283
Received- The WP Foodbakery Plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 4.7 due to insufficient input sanitization and output escaping on the 'search_type' parameter.
- This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. - CVE-2024-13440 -- 2025-02-09T05:15:22.740
Received- The Super Store Finder Plugin for WordPress is vulnerable to SQL Injection via the ‘ssf_wp_user_name’ parameter in all versions up to, and including, 7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.
- This makes it possible for unauthenticated attackers to append additional SQL queries into an already existing query to store Cross-Site Scripting in store reviews. - CVE-2025-0169 -- 2025-02-08T23:15:08.653
Received- The DWT - Directory & Listing WordPress Theme is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.3.4 due to insufficient input sanitization and output escaping on user supplied attributes.
- This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - CVE-2025-0316 -- 2025-02-08T22:15:28.477
Received- The WP Directorybox Manager Plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.5.
- This is due to incorrect authentication in the 'wp_dp_enquiry_agent_contact_form_submit_callback' function.
- This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username. - CVE-2024-13850 -- 2025-02-08T13:15:06.840
Received- The Simple add pages or posts Plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping.
- This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- This only affects multi-site installations and installations where unfiltered_html has been disabled. - CVE-2024-7425 -- 2025-02-07T17:15:30.603
Received- The WP ALL Export Pro Plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to improper user input validation and sanitization in all versions up to, and including, 1.9.1.
- This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on the WordPress site.
- This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. - CVE-2024-9664 -- 2025-02-07T16:15:39.470
Received- The WP All Import Pro Plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.9.7 via deserialization of untrusted input from an import file.
- This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object.
- No known POP chain is present in the vulnerable software.
- If a POP chain is present via an additional Plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. - CVE-2024-9661 -- 2025-02-07T16:15:39.263
Received- The WP All Import Pro Plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.9.7.
- This is due to missing nonce validation on the delete_and_edit function.
- This makes it possible for unauthenticated attackers to delete imported content (posts, comments, users, etc.) via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. - CVE-2024-7419 -- 2025-02-07T16:15:39.100
Received- The WP ALL Export Pro Plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.9.1 via the custom export fields.
- This is due to the missing input validation and sanitization of user-supplied data.
- This makes it possible for unauthenticated attackers to inject arbitrary PHP code into form fields that get executed on the server during the export, potentially leading to a complete site compromise.
- As a prerequisite, the custom export field should include fields containing user-supplied data. - CVE-2025-25077 -- 2025-02-07T10:15:12.883
Awaiting Analysis- Improper Neutralization of Input During Web Page Generation ('Cross-Site Scripting') vulnerability in dugbug Easy Chart Builder for WordPress allows Stored XSS.
- This issue affects Easy Chart Builder for WordPress: from n/a through 1.3. Vulnerabilidad de neutralización incorrecta de la entrada durante la generación de páginas web ('Cross-Site Scripting') en dugbug Easy Chart Builder for WordPress permite XSS almacenado.
- Este problema afecta a Easy Chart Builder for WordPress: desde n/a hasta 1.3. - CVE-2024-13841 -- 2025-02-07T07:15:14.573
Awaiting Analysis- The Builder shortcode Extras – WordPress shortcodes Collection to Save You Time Plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.0 via the 'bse-elementor-template' shortcode due to insufficient restrictions on which posts can be included.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private and draft posts created with Elementor that they should not have access to. El complemento Builder shortcode Extras – WordPress shortcodes Collection to Save You Time para WordPress es vulnerable a la exposición de información en todas las versiones hasta la 1.0.0 incluida a través del shortcode 'bse-elementor-template' debido a restricciones insuficientes sobre qué publicaciones se pueden incluir.
- Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones privadas y borradores creadas con Elementor a las que no deberían tener acceso. - CVE-2024-13492 -- 2025-02-07T06:15:30.237
Received- The Guten Free Options WordPress Plugin through 0.9.5 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
- CVE-2024-13352 -- 2025-02-07T06:15:29.607
Received- The Legull WordPress Plugin through 1.2.2 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
- CVE-2025-1061 -- 2025-02-07T02:15:29.587
Awaiting Analysis- The Nextend Social Login Pro Plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.16.
- This is due to insufficient verification on the user being supplied during the Apple OAuth authenticate request through the Plugin.
- This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. El complemento Nextend Social Login Pro para WordPress es vulnerable a la omisión de la autenticación en versiones hasta la 3.1.16 incluida.
- Esto se debe a que no se proporciona suficiente verificación del usuario durante la solicitud de autenticación de Apple OAuth a través del complemento.
- Esto hace posible que atacantes no autenticados inicien sesión como cualquier usuario existente en el sitio, como un administrador, si tienen acceso al correo electrónico. - CVE-2025-0859 -- 2025-02-06T10:15:08.340
Received- The Post and Page Builder by BoldGrid – Visual Drag and Drop Editor Plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.27.6 via the template_via_url() function.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. El complemento Post and Page Builder de BoldGrid – Visual Drag and Drop Editor para WordPress es vulnerable a Path Traversal en todas las versiones hasta la 1.27.6 incluida a través de la función template_via_url().
- Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, lean el contenido de archivos arbitrarios en el servidor, que pueden contener información confidencial. - CVE-2024-13487 -- 2025-02-06T07:15:15.357
Received- The The CURCY – Multi Currency for WooCommerce – The best free currency exchange Plugin – Run smoothly on WooCommerce 9.x Plugin for WordPress is vulnerable to arbitrary shortcode execution via the get_products_price() function in all versions up to, and including, 2.2.5.
- This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode.
- This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. El complemento The CURCY – Multi Currency for WooCommerce – The best free currency exchange Plugin – Run smoothly on WooCommerce 9.x para WordPress es vulnerable a la ejecución de shortcodes arbitrarios a través de la función get_products_price() en todas las versiones hasta la 2.2.5 incluida.
- Esto se debe a que el software permite a los usuarios ejecutar una acción que no valida correctamente un valor antes de ejecutar do_shortcode.
- Esto hace posible que atacantes no autenticados ejecuten shortcodes arbitrarios. - CVE-2025-0522 -- 2025-02-06T06:15:30.357
Received- The LikeBot WordPress Plugin through 0.85 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. El complemento LikeBot para WordPress hasta la versión 0.85 no tiene verificación CSRF en algunos lugares y le falta desinfección y sanitise, lo que podría permitir a los atacantes hacer que el administrador que haya iniciado sesión agregue payloads XSS almacenado a través de un ataque CSRF.
- CVE-2024-13829 -- 2025-02-05T06:15:31.257
Received- The WordPress form builder Plugin for contact forms, surveys and quizzes – Tripetto Plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 8.0.8 via the 'attachments.php' file.
- This makes it possible for unauthenticated attackers to extract sensitive data including files uploaded via forms. El complemento WordPress form builder Plugin for contact forms, surveys and quizzes – Tripetto para WordPress, es vulnerable a la exposición de información confidencial en todas las versiones hasta la 8.0.8 y incluida, a través del archivo 'attachments.php'.
- Esto permite que atacantes no autenticados extraigan archivos de datos confidenciales incluida cargados a través de formularios. - CVE-2025-1028 -- 2025-02-05T04:15:06.543
Received- The Contact Manager Plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the contact form upload feature in all versions up to, and including, 8.6.4.
- This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible in specific configurations where the first extension is processed over the final.
- This vulnerability also requires successfully exploiting a race condition in order to exploit. El complemento Contact Manager para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validación del tipo de archivo en la función de carga del formulario de contacto en todas las versiones hasta la 8.6.4 y incluida.
- Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecución remota de código en configuraciones específicas donde la primera extensión se procesa en lugar de la final.
- Esta vulnerabilidad también requiere explotar con éxito una condición ejecución para poder explotarla. - CVE-2024-13699 -- 2025-02-04T13:15:07.953
Analyzed- The Qi Addons For Elementor Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘cursor’ parameter in all versions up to, and including, 1.8.7 due to insufficient input sanitization and output escaping.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- The vulnerability was partially patched in versions 1.8.5, 1.8.6, and 1.8.7. El complemento Qi Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a través del parámetro 'cursor' en todas las versiones hasta la 1.8.7 y incluida, debido a un sanitise insuficiente de desinfección de entrada y salida.
- Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada.
- La vulnerabilidad fue parcialmente corregida en las versiones 1.8.5, 1.8.6 y 1.8.7. - CVE-2024-13733 -- 2025-02-04T10:15:08.527
Awaiting Analysis- The SKT Blocks – Gutenberg based Page Builder Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Plugin's skt-blocks/post-carousel block in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping on user supplied attributes.
- This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. El complemento SKT Blocks – Gutenberg Based Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a través del bloque skt-blocks/post-carousel del complemento en todas las versiones hasta la 1.7 y incluida, debido a la falta de entrada desinfección y al sanitise de salida en los atributos proporcionados por el usuario.
- Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las páginas que se ejecutarán siempre que un usuario acceda a una página inyectada. - CVE-2024-13529 -- 2025-02-04T10:15:08.333
Awaiting Analysis- The SocialV - Social Network and Community BuddyPress Theme theme for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'socialv_send_download_file' function in all versions up to, and including, 2.0.15.
- This makes it possible for authenticated attackers, with Subscriber-level access and above, to download arbitrary files from the target system. El tema SocialV - Social Network and Community BuddyPress Theme para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificación de capacidad en la función 'socialv_send_download_file' en todas las versiones hasta la 2.0.15 y incluida.
- Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, descarguen archivos arbitrarios del objetivo sistema. - CVE-2024-13510 -- 2025-02-04T10:15:08.167
Awaiting Analysis- The ShopSite Plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.10.
- This is due to missing or incorrect nonce validation on a function.
- This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. El complemento ShopSite para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.5.10 y incluida.
- Esto se debe a una validación de nonce incorrecta o faltante en una función.
- Esto hace posible que atacantes no autenticados actualicen configuraciones e inyecten scripts web maliciosa a través de una solicitud falsificada, siempre que puedan engañar al administrador del sitio para que realice una acción como hacer clic en un enlace. - CVE-2024-13356 -- 2025-02-04T10:15:07.920
Awaiting Analysis- The DSGVO All in one for WP Plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.6.
- This is due to missing or incorrect nonce validation in the user_remove_form.php file.
- This makes it possible for unauthenticated attackers to delete admin user accounts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. El complemento DSGVO All in one for WP para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.6 y incluida.
- Esto se debe a la falta o la validación incorrecta de nonce en el archivo user_remove_form.php.
- Esto hace posible que atacantes no autenticados eliminen cuentas de usuario administrador a través de una solicitud falsificada, siempre que puedan engañar a un administrador del sitio para que realice una acción como hacer clic en un enlace. - CVE-2024-13403 -- 2025-02-04T09:15:09.303
Awaiting Analysis- The WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘fieldHTML’ parameter in all versions up to, and including, 1.9.3.1 due to insufficient input sanitization and output escaping.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. El complemento WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More para WordPress es vulnerable a Cross-Site Scripting Almacenado a través del parámetro ‘fieldHTML’ en todas las versiones hasta incluida, 1.9.3.1 debido a un sanitise de entrada desinfección y de salida insuficiente.
- Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. - CVE-2024-13514 -- 2025-02-04T08:15:28.777
Awaiting Analysis- The B Slider- Gutenberg Slider Block for WP Plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.9.5 via the 'bsb-slider' shortcode due to insufficient restrictions on which posts can be included.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private posts that they should not have access to. El complemento B Slider- Gutenberg Slider Block for WP para WordPress es vulnerable a la exposición de información en todas las versiones hasta la 1.9.5 y incluida a través del código corto 'bsb-slider' debido a restricciones insuficientes sobre qué publicaciones se pueden incluir.
- Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones privadas a las que no deberían tener acceso. - CVE-2024-12046 -- 2025-02-04T08:15:28.583
Awaiting Analysis- The Medical Addon for Elementor Plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.6.2 via the 'namedical_elementor_template' shortcode due to missing validation on a user controlled key.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to read the content of draft, pending, and private posts. El complemento Medical Addon para Elementor para WordPress es vulnerable a la referencia directa a objetos inseguros en todas las versiones hasta la 1.6.2 y incluida a través del código abreviado 'namedical_elementor_template' debido a la falta de validación en una clave controlada por el usuario.
- Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, lean el contenido de publicaciones en borrador, pendientes y privadas. - CVE-2024-13607 -- 2025-02-04T07:15:12.973
Awaiting Analysis- The JS Help Desk – The Ultimate Help Desk & Support Plugin Plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.8.8 via the 'exportusereraserequest' due to missing validation on a user controlled key.
- This makes it possible for authenticated attackers, with Subscriber-level permissions and above, to export ticket data for any user. El complemento JS Help Desk – The Ultimate Help Desk & Support Plugin para WordPress es vulnerable a la referencia directa a objetos inseguros en todas las versiones hasta incluida, 2.8.8 a través de 'exportusereraserequest' debido a la falta de validación en una clave controlada por el usuario.
- Esto permite que atacantes autenticados, con permisos de nivel de suscriptor y superiores, exporten datos de tickets para cualquier usuario. - CVE-2024-12597 -- 2025-02-04T07:15:12.520
Analyzed- The HT Mega – Absolute Addons For Elementor Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'block_css' and 'inner_css' parameters in all versions up to, and including, 2.7.6 due to insufficient input sanitization and output escaping.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. El complemento HT Mega – Absolute Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a través de los parámetros 'block_css' e 'inner_css' en todas las versiones hasta incluida, 2.7.6 debido a un sanitise de entrada desinfección y salida insuficiente.
- Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. - CVE-2025-0466 -- 2025-02-04T06:15:30.160
Awaiting Analysis- The Sensei LMS WordPress Plugin before 4.24.4 does not properly protect some its REST API routes, allowing unauthenticated attackers to leak sensei_email and sensei_message Information. El complemento Sensei LMS para WordPress anterior a la versión 4.24.4 no protege adecuadamente algunas de sus rutas de API REST, lo que permite que atacantes no autenticados filtren información de sensei_email y sensei_message.
- CVE-2025-0368 -- 2025-02-04T06:15:30.037
Awaiting Analysis- The Banner Garden Plugin for WordPress Plugin through 0.1.3 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin or unauthenticated users. El complemento Banner Garden para WordPress hasta la versión 0.1.3 no desinfecta ni escapa un parámetro antes de mostrarlo nuevamente en la página, lo que genera un Cross-Site Scripting Reflejado que podría usarse contra usuarios con privilegios altos, como administradores o usuarios no autenticados.
- CVE-2024-13332 -- 2025-02-04T06:15:29.917
Awaiting Analysis- The TransFinanz WordPress Plugin through 1.0.0 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin El complemento TransFinanz para WordPress hasta la versión 1.0.0 no desinfecta ni escapa un parámetro antes de mostrarlo nuevamente en la página, lo que genera un Cross-Site Scripting Reflejado que podría usarse contra usuarios con privilegios altos, como el administrador.
- CVE-2024-13331 -- 2025-02-04T06:15:29.807
Awaiting Analysis- The WP Dream Carousel WordPress Plugin through 1.0.1b does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin El complemento WP Dream Carousel para WordPress hasta la versión 1.0.1b no desinfecta ni escapa un parámetro antes de mostrarlo nuevamente en la página, lo que genera un Cross-Site Scripting Reflejado que podría usarse contra usuarios con privilegios altos, como el administrador.
- CVE-2024-13330 -- 2025-02-04T06:15:29.683
Awaiting Analysis- The JustRows free WordPress Plugin through 0.2 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin El complemento JustRows free para WordPress hasta la versión 0.2 no desinfecta ni escapa un parámetro antes de mostrarlo nuevamente en la página, lo que genera un Cross-Site Scripting Reflejado que podría usarse contra usuarios con privilegios altos, como el administrador.
- CVE-2024-13329 -- 2025-02-04T06:15:29.560
Awaiting Analysis- The Solidres WordPress Plugin through 0.9.4 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin El complemento Solidres WordPress hasta la versión 0.9.4 no desinfecta ni escapa un parámetro antes de mostrarlo nuevamente en la página, lo que genera un Cross-Site Scripting Reflejado que podría usarse contra usuarios con privilegios altos, como el administrador.
- CVE-2024-13328 -- 2025-02-04T06:15:29.450
Awaiting Analysis- The Giga Messenger WordPress Plugin through 2.3.1 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin El complemento Giga Messenger para WordPress hasta la versión 2.3.1 no desinfecta ni escapa un parámetro antes de mostrarlo nuevamente en la página, lo que genera un Cross-Site Scripting Reflejado que podría usarse contra usuarios con privilegios altos, como el administrador.
- CVE-2024-13327 -- 2025-02-04T06:15:29.337
Awaiting Analysis- The Musicbox WordPress Plugin through 2.0.3 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin El complemento Musicbox de WordPress hasta la versión 2.0.3 no desinfecta ni escapa un parámetro antes de mostrarlo nuevamente en la página, lo que genera un Cross-Site Scripting Reflejado que podría usarse contra usuarios con privilegios altos, como el administrador.
- CVE-2024-13326 -- 2025-02-04T06:15:29.227
Awaiting Analysis- The iBuildApp WordPress Plugin through 0.2.0 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin El complemento iBuildApp de WordPress hasta la versión 0.2.0 no desinfecta ni escapa un parámetro antes de mostrarlo nuevamente en la página, lo que genera un Cross-Site Scripting Reflejado que podría usarse contra usuarios con privilegios altos, como el administrador.
- CVE-2024-13325 -- 2025-02-04T06:15:29.103
Awaiting Analysis- The Glossy WordPress Plugin through 2.3.5 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin El complemento Glossy WordPress hasta la versión 2.3.5 no desinfecta ni escapa un parámetro antes de mostrarlo nuevamente en la página, lo que genera un Cross-Site Scripting Reflejado que podría usarse contra usuarios con privilegios altos, como el administrador.
- CVE-2024-13115 -- 2025-02-04T06:15:28.987
Awaiting Analysis- The WP Projects Portfolio with Client Testimonials WordPress Plugin through 3.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. El complemento WP Projects Portfolio with Client Testimonials de WordPress hasta la versión 3.0 no tiene verificación CSRF en algunos lugares y la falta de desinfección y sanitise, lo que podría permitir a los atacantes hacer que el administrador que haya iniciado sesión agregue XSS almacenado payloads a través de un ataque CSRF.
- CVE-2024-13114 -- 2025-02-04T06:15:27.627
Awaiting Analysis- The WP Projects Portfolio with Client Testimonials WordPress Plugin through 3.0 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. El complemento WP Projects Portfolio with Client Testimonials de WordPress hasta la versión 3.0 no desinfecta ni escapa un parámetro antes de mostrarlo nuevamente en la página, lo que genera un Cross-Site Scripting Reflejado que podría usarse contra usuarios con privilegios altos, como el administrador.
- CVE-2024-12859 -- 2025-02-03T20:15:32.940
Awaiting Analysis- The BoomBox Theme Extensions Plugin for WordPress is vulnerable to Local file Inclusion in all versions up to, and including, 1.8.0 via the 'boombox_listing' shortcode 'type' attribute.
- This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files.
- This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included. El complemento BoomBox Theme Extensions para WordPress es vulnerable a la inclusión de archivos locales en todas las versiones hasta la 1.8.0 y incluida, a través del atributo 'type' del código abreviado 'boombox_listing'.
- Esto permite que atacantes autenticados, con permisos de nivel de colaborador y superiores, incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecución de cualquier código PHP en esos archivos.
- Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecución de código en casos en los que se pueda cargar e incluir el tipo de archivo php. - CVE-2024-11134 -- 2025-02-03T20:15:32.373
Awaiting Analysis- The Eventer Plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'eventer_export_bookings_csv' function in all versions up to, and including, 3.9.9.
- This makes it possible for authenticated attackers with subscriber-level permissions or above, to download bookings, which contains customers' personal data. El complemento Eventer para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de comprobación de la función 'eventer_export_bookings_csv' en todas las versiones hasta la 3.9.9 y incluida.
- Esto permite que atacantes autenticados con permisos de nivel de suscriptor o superior descarguen reservas que contienen datos personales de los clientes. - CVE-2024-11133 -- 2025-02-03T20:15:32.203
Awaiting Analysis- The Eventer Plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'handle_pdf_download_request' function in all versions up to, and including, 3.9.9.
- This makes it possible for unauthenticated attackers to download event tickets. El complemento Eventer para WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificación de capacidad en la función 'handle_pdf_download_request' en todas las versiones hasta la 3.9.9 y incluida.
- Esto permite que atacantes no autenticados descarguen entradas para eventos. - CVE-2024-11132 -- 2025-02-03T20:15:32.047
Awaiting Analysis- The Eventer Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.9.9 due to insufficient input sanitization and output escaping on user supplied attributes.
- This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. El complemento Eventer para WordPress es vulnerable a Cross-Site Scripting Almacenado a través de códigos cortos en versiones hasta incluida, 3.9.9 debido a la falta de entrada desinfección y el sanitise de salida en los atributos proporcionados por el usuario.
- Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitraria en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. - CVE-2025-23614 -- 2025-02-03T15:15:22.270
Awaiting Analysis- Improper Neutralization of Input During Web Page Generation ('Cross-Site Scripting') vulnerability in Nik Sudan WordPress Additional Logins allows Reflected XSS.
- This issue affects WordPress Additional Logins: from n/a through 1.0.0. Vulnerabilidad de neutralización incorrecta de la entrada durante la generación de páginas web ('Cross-Site Scripting') en Nik Sudan WordPress Additional Logins que permite XSS reflejado.
- Este problema afecta a los inicios de sesión adicionales de WordPress: desde n/a hasta 1.0.0. - CVE-2025-23588 -- 2025-02-03T15:15:21.387
Awaiting Analysis- Improper Neutralization of Input During Web Page Generation ('Cross-Site Scripting') vulnerability in WOW WordPress WOW Best CSS Compiler allows Reflected XSS.
- This issue affects WOW Best CSS Compiler: from n/a through 2.0.2. Vulnerabilidad de neutralización incorrecta de la entrada durante la generación de páginas web ('Cross-Site Scripting') en WOW WordPress WOW Best CSS Compiler permite XSS reflejado.
- Este problema afecta a WOW Best CSS Compiler: desde n/a hasta 2.0.2. - CVE-2025-22704 -- 2025-02-03T15:15:20.273
Awaiting Analysis- Cross-Site Request Forgery (CSRF) vulnerability in Abinav Thakuri WordPress Signature allows Cross Site Request Forgery.
- This issue affects WordPress Signature: from n/a through 0.1. La vulnerabilidad Cross-Site Request Forgery (CSRF) en WordPress Signature de Abinav Thakuri permite Cross Site Request Forgery.
- Este problema afecta a WordPress Signature: desde n/a hasta la versión 0.1. - CVE-2024-13347 -- 2025-02-03T06:15:10.180
Awaiting Analysis- The Essential WP Real Estate WordPress Plugin through 1.1.3 does not sanitise generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting. El complemento Essential WP Real Estate para WordPress hasta la versión 1.1.3 no escapa de las URL generadas antes de mostrarlas en atributos, lo que genera Cross-Site Scripting Reflejado.