Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): Wordpress
  • Search Type: Search All
There are 3,687 matching records.
Displaying matches 21 through 40.
Vuln ID Summary CVSS Severity
CVE-2021-24597

The You Shang WordPress plugin through 1.0.1 does not escape its qrcode links settings, which result into Stored Cross-Site Scripting issues in frontend posts and the plugins settings page depending on the payload used

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24596

The youForms for WordPress plugin through 1.0.5 does not sanitise escape the Button Text field of its Templates, allowing high privilege users (editors and admins) to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24587

The Splash Header WordPress plugin before 1.20.8 doesn't sanitise and escape some of its settings while outputting them in the admin dashboard, leading to an authenticated Stored Cross-Site Scripting issue.

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24585

The Timetable and Event Schedule WordPress plugin before 2.4.0 outputs the Hashed Password, Username and Email Address (along other less sensitive data) of the user related to the Even Head of the Timeslot in the response when requesting the event Timeslot data with a user with the edit_posts capability. Combined with the other Unauthorised Event Timeslot Modification issue (https://wpscan.com/reports/submissions/4699/) where an arbitrary user ID can be set, this could allow low privilege users with the edit_posts capability (such as author) to retrieve sensitive User data by iterating over the user_id

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24584

The Timetable and Event Schedule WordPress plugin before 2.4.2 does not have proper access control when updating a timeslot, allowing any user with the edit_posts capability (contributor+) to update arbitrary timeslot from any events. Furthermore, no CSRF check is in place as well, allowing such attack to be perform via CSRF against a logged in with such capability. In versions before 2.3.19, the lack of sanitisation and escaping in some of the fields, like the descritption could also lead to Stored XSS issues

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24583

The Timetable and Event Schedule WordPress plugin before 2.4.2 does not have proper access control when deleting a timeslot, allowing any user with the edit_posts capability (contributor+) to delete arbitrary timeslot from any events. Furthermore, no CSRF check is in place as well, allowing such attack to be performed via CSRF against a logged in with such capability

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24582

The ThinkTwit WordPress plugin before 1.7.1 did not sanitise or escape its "Consumer key" setting before outputting it its settings page, leading to a Stored Cross-Site Scripting issue.

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24530

The Alojapro Widget WordPress plugin through 1.1.15 doesn't properly sanitise its Custom CSS settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24525

The Shortcodes Ultimate WordPress plugin before 5.10.2 allows users with Contributor roles to perform stored XSS via shortcode attributes. Note: the plugin is inconsistent in its handling of shortcode attributes; some do escape, most don't, and there are even some attributes that are insecure by design (like [su_button]'s onclick attribute).

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24511

The fetch_product_ajax functionality in the Product Feed on WooCommerce WordPress plugin before 3.3.1.0 uses a `product_id` POST parameter which is not properly sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24404

The options.php file of the WP-Board WordPress plugin through 1.1 beta accepts a postid parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query ran twice.

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24403

The Orders functionality in the WordPress Page Contact plugin through 1.0 has an order_id parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24402

The Orders functionality in the WP iCommerce WordPress plugin through 1.1.1 has an `order_id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection. The feature is available to low privilege users such as contributors

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24401

The Edit domain functionality in the WP Domain Redirect WordPress plugin through 1.0 has an `editid` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24400

The Edit Role functionality in the Display Users WordPress plugin through 2.0.0 had an `id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.

Published: September 20, 2021; 6:15:08 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24399

The check_order function of The Sorter WordPress plugin through 1.0 uses an `area_id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.

Published: September 20, 2021; 6:15:07 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24398

The Add new scene functionality in the Responsive 3D Slider WordPress plugin through 1.2 uses an id parameter which is not sanitised, escaped or validated before being inserted to a SQL statement, leading to SQL injection. This is a time based SQLI and in the same function vulnerable parameter is passed twice so if we pass time as 5 seconds it takes 10 seconds to return since the query is ran twice.

Published: September 20, 2021; 6:15:07 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24397

The edit functionality in the MicroCopy WordPress plugin through 1.1.0 makes a get request to fetch the related option. The id parameter used is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.

Published: September 20, 2021; 6:15:07 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-24396

A pageid GET parameter of the GSEOR – WordPress SEO Plugin WordPress plugin through 1.3 is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.

Published: September 20, 2021; 6:15:07 AM -0400
V3.x:(not available)
V2.0:(not available)
CVE-2021-39327

The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1.

Published: September 17, 2021; 7:15:08 AM -0400
V3.1: 5.3 MEDIUM
V2.0:(not available)