4 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in N.O.U.S. Open Useful and Simple Event post allows PHP Local File Inclusion.This issue affects Event post: from n/a through 5.9.5. The Event post plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 5.9.5 via the generate_ics() function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. • https://patchstack.com/database/vulnerability/event-post/wordpress-event-post-plugin-5-9-5-local-file-inclusion-vulnerability?_s_id=cve • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The Event post plugin for WordPress is vulnerable to unauthorized bulk metadata update due to a missing nonce check on the save_bulkdatas function in all versions up to, and including, 5.9.5. This makes it possible for unauthenticated attackers to update post_meta_data via a forged request, granted they can trick a logged-in user into performing an action such as clicking on a link. El complemento Event post para WordPress es vulnerable a actualizaciones masivas de metadatos no autorizadas debido a la falta de una verificación nonce en la función save_bulkdatas en todas las versiones hasta la 5.9.5 incluida. Esto hace posible que atacantes no autenticados actualicen post_meta_data a través de una solicitud falsificada, siempre que puedan engañar a un usuario que ha iniciado sesión para que realice una acción como hacer clic en un enlace. The Event post plugin for WordPress is vulnerable to unauthorized bulk metadata update due to a missing nonce check on the save_bulkdatas function in all versions up to, and including, 5.9.6. • https://plugins.trac.wordpress.org/browser/event-post/trunk/eventpost.php?rev=3086840#L2446 https://www.wordfence.com/threat-intel/vulnerabilities/id/964950dc-d8e1-4a9b-bef2-ea51abc5a925?source=cve • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The Event post plugin for WordPress is vulnerable to unauthorized bulk metadata update due to a missing capability check on the save_bulkdatas function in all versions up to, and including, 5.9.4. This makes it possible for authenticated attackers, with subscriber access or higher, to update post_meta_data. El complemento Event post para WordPress es vulnerable a actualizaciones masivas de metadatos no autorizadas debido a una falta de verificación de capacidad en la función save_bulkdatas en todas las versiones hasta la 5.9.4 incluida. Esto hace posible que atacantes autenticados, con acceso de suscriptor o superior, actualicen post_meta_data. • https://plugins.trac.wordpress.org/changeset/3086840/event-post/trunk/eventpost.php?old=3060317&old_path=event-post%2Ftrunk%2Feventpost.php https://www.wordfence.com/threat-intel/vulnerabilities/id/926c09d5-3824-4745-99f6-50d9c945d252?source=cve • CWE-284: Improper Access Control •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in N.O.U.S. Open Useful and Simple Event post allows Stored XSS.This issue affects Event post: from n/a through 5.8.6. La vulnerabilidad de neutralización inadecuada de la entrada durante la generación de páginas web ('cross-site Scripting') en N.O.U.S. Open Useful and Simple Event post permite XSS almacenado. Este problema afecta a Event post: desde n/a hasta 5.8.6. • https://patchstack.com/database/vulnerability/event-post/wordpress-event-post-plugin-5-8-6-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •