Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): Wordpress
- Search Type: Search All
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2022-4267 |
The Bulk Delete Users by Email WordPress plugin through 1.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting Published: December 26, 2022; 8:15:14 AM -0500 |
V3.1: 6.1 MEDIUM V2.0:(not available) |
CVE-2022-4266 |
The Bulk Delete Users by Email WordPress plugin through 1.2 does not have CSRF check when deleting users, which could allow attackers to make a logged in admin delete non admin users by knowing their email via a CSRF attack Published: December 26, 2022; 8:15:14 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-4243 |
The ImageInject WordPress plugin through 1.17 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 4.8 MEDIUM V2.0:(not available) |
CVE-2022-4242 |
The WP Google Review Slider WordPress plugin before 11.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 4.8 MEDIUM V2.0:(not available) |
CVE-2022-4239 |
The Workreap WordPress theme before 2.6.4 does not verify that an addon service belongs to the user issuing the request, or indeed that it is an addon service, when processing the workreap_addons_service_remove action, allowing any user to delete any post by knowing or guessing the id. Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-4227 |
The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin before 6.0.0 do not escape some URLs and parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 6.1 MEDIUM V2.0:(not available) |
CVE-2022-4226 |
The Simple Basic Contact Form WordPress plugin before 20221201 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 4.8 MEDIUM V2.0:(not available) |
CVE-2022-4197 |
The Sliderby10Web WordPress plugin before 1.2.53 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 4.8 MEDIUM V2.0:(not available) |
CVE-2022-4166 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the addCountS POST parameter before concatenating it to an SQL query in 4_activate.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-4165 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_order POST parameter before concatenating it to an SQL query in order-custom-fields-with-and-without-search.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-4164 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_multiple_files_for_post POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-4163 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_deactivate and cg_activate POST parameters before concatenating it to an SQL query in 2_deactivate.php and 4_activate.php, respectively. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-4162 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_row POST parameter before concatenating it to an SQL query in 3_row-order.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-4161 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_start POST parameter before concatenating it to an SQL query in copy-gallery-images.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-4160 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_copy_id POST parameter before concatenating it to an SQL query in cg-copy-comments.php and cg-copy-rating.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-4159 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_id POST parameter before concatenating it to an SQL query in 0_change-gallery.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-4158 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_Fields POST parameter before concatenating it to an SQL query in users-registry-check-registering-and-login.php. This may allow malicious visitors to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-4157 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the cg_option_id POST parameter before concatenating it to an SQL query in export-votes-all.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:13 AM -0500 |
V3.1: 4.9 MEDIUM V2.0:(not available) |
CVE-2022-4156 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the user_id POST parameter before concatenating it to an SQL query in ajax-functions-backend.php. This may allow malicious users with at least author privilege to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:12 AM -0500 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2022-4155 |
The Contest Gallery WordPress plugin before 19.1.5.1, Contest Gallery Pro WordPress plugin before 19.1.5.1 do not escape the wp_user_id GET parameter before concatenating it to an SQL query in management-show-user.php. This may allow malicious users with administrator privileges (i.e. on multisite WordPress configurations) to leak sensitive information from the site's database. Published: December 26, 2022; 8:15:12 AM -0500 |
V3.1: 4.9 MEDIUM V2.0:(not available) |