CVE-2023-49823 – WordPress Bold Page Builder Plugin <= 4.6.1 is vulnerable to Cross Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2023-49823
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BoldThemes Bold Page Builder allows Stored XSS.This issue affects Bold Page Builder: from n/a through 4.6.1. La vulnerabilidad de neutralización inadecuada de la entrada durante la generación de páginas web ('cross-site Scripting') en BoldThemes Bold Page Builder permite almacenar XSS. Este problema afecta a Bold Page Builder: desde n/a hasta 4.6.1. The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 4.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://patchstack.com/database/vulnerability/bold-page-builder/wordpress-bold-page-builder-plugin-4-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-4828 – Bold Timeline Lite < 1.1.5 - Contributor+ Stored XSS via Shortcode
https://notcve.org/view.php?id=CVE-2022-4828
The Bold Timeline Lite WordPress plugin before 1.1.5 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. The Bold Timeline Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in versions up to, and including, 1.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page • https://wpscan.com/vulnerability/06e1d63e-576b-4e16-beb7-4f0bfb85e948 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-2089 – Bold Page Builder < 4.3.3 - Admin+ Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2022-2089
The Bold Page Builder WordPress plugin before 4.3.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed. El plugin Bold Page Builder de WordPress versiones anteriores a 4.3.3 no sanea y escapa de algunas de sus configuraciones, lo que podría permitir a los usuarios con altos privilegios, como los administradores, llevar a cabo ataques de Cross-Site Scripting incluso cuando unfiltered_html está deshabilitado • https://wpscan.com/vulnerability/9fe7e9d5-7bdf-4ade-9a3c-b4af863fa4e8 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-24820 – Cost Calculator <= 1.6 - Authenticated Local File Inclusion
https://notcve.org/view.php?id=CVE-2021-24820
The Cost Calculator WordPress plugin through 1.6 allows authenticated users (Contributor+ in versions < 1.5, and Admin+ in versions <= 1.6) to perform path traversal and local PHP file inclusion on Windows Web Servers via the Cost Calculator post's Layout El plugin de Cost Calculator de WordPress hasta la versión 1.6 permite a los usuarios autentificados (Contributor+ en las versiones anteriores a la versión 1.5, y Admin+ en las versiones anteriores o iguales a la versión 1.6) realizar el path traversal y la inclusión de archivos PHP locales en los servidores web de Windows a través del Layout del post Cost Calculator. The Cost Calculator WordPress plugin through 1.7 allows authenticated users (Contributor+ in versions < 1.5, and Admin+ in versions <= 1.8) to perform path traversal and local PHP file inclusion on Windows Web Servers via the Cost Calculator post's Layout • https://wpscan.com/vulnerability/47652b24-a6f0-4bbc-834e-496b88523fe7 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •
CVE-2021-24579 – Bold Page Builder < 3.1.6 - PHP Object Injection
https://notcve.org/view.php?id=CVE-2021-24579
The bt_bb_get_grid AJAX action of the Bold Page Builder WordPress plugin before 3.1.6 passes user input into the unserialize() function without any validation or sanitisation, which could lead to a PHP Object Injection. Even though the plugin did not contain a suitable gadget to fully exploit the issue, other installed plugins on the blog could allow such issue to be exploited and lead to RCE in some cases. La acción bt_bb_get_grid AJAX del plugin de WordPress Bold Page Builder versiones anteriores a 3.1.6, pasa la entrada del usuario a la función unserialize() sin ninguna comprobación o saneamiento, lo que podría conllevar a una Inyección de Objeto PHP. Aunque el plugin no contenía un gadget adecuado para explotar completamente el problema, otros plugins instalados en el blog podrían permitir que este problema sea explotado y conllevar a un RCE en algunos casos. • https://wpscan.com/vulnerability/08edce3f-2746-4886-8439-76e44ec76fa8 • CWE-502: Deserialization of Untrusted Data •