
CVE-2023-47754 – WordPress Delete Duplicate Posts Plugin <= 4.8.9 is vulnerable to Broken Access Control
https://notcve.org/view.php?id=CVE-2023-47754
13 Nov 2023 — Missing Authorization vulnerability in Clever plugins Delete Duplicate Posts allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Delete Duplicate Posts: from n/a through 4.8.9. Vulnerabilidad de autorización faltante en los complementos de Clever. Eliminar publicaciones duplicadas permite acceder a la funcionalidad no restringida adecuadamente por las ACL. Este problema afecta la eliminación de publicaciones duplicadas: desde n/a hasta 4.8.9. The Delete Duplicate Posts plugin ... • https://patchstack.com/database/vulnerability/delete-duplicate-posts/wordpress-delete-duplicate-posts-plugin-4-8-9-broken-access-control-vulnerability?_s_id=cve • CWE-862: Missing Authorization •

CVE-2022-4974 – Freemius SDK <= 2.4.2 - Missing Authorization Checks
https://notcve.org/view.php?id=CVE-2022-4974
04 Mar 2022 — The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable. • https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=cve • CWE-862: Missing Authorization •

CVE-2021-24747 – SEO Booster < 3.8 - Admin+ SQL Injection
https://notcve.org/view.php?id=CVE-2021-24747
15 Nov 2021 — The SEO Booster WordPress plugin before 3.8 allows for authenticated SQL injection via the "fn_my_ajaxified_dataloader_ajax" AJAX request as the $_REQUEST['order'][0]['dir'] parameter is not properly escaped leading to blind and error-based SQL injections. El plugin SEO Booster de WordPress anterior a la versión 3.8 permite la inyección SQL autentificada a través de la petición AJAX "fn_my_ajaxified_dataloader_ajax", ya que el parámetro $_REQUEST['order'][0]['dir'] no se escapa correctamente, lo que conduce... • https://plugins.trac.wordpress.org/changeset/2637115 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •