2 results (0.001 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

The Tainacan plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.21.10. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. • https://www.wordfence.com/threat-intel/vulnerabilities/id/85a8a7df-b472-4a81-b808-a413c158c1cf?source=cve https://plugins.trac.wordpress.org/browser/tainacan/tags/0.21.10/classes/theme-helper/template-tags.php#L1524 https://plugins.trac.wordpress.org/changeset/3165873 https://plugins.trac.wordpress.org/browser/tainacan/tags/0.21.10/classes/theme-helper/template-tags.php#L1298 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

The Tainacan plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_file' function in all versions up to, and including, 0.21.7. The function is also vulnerable to directory traversal. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. El complemento Tainacan para WordPress es vulnerable al acceso no autorizado a los datos debido a una verificación de capacidad faltante en la función 'get_file' en todas las versiones hasta la 0.21.7 incluida. La función también es vulnerable a directory traversal. • https://github.com/RandomRobbieBF/CVE-2024-7135 https://plugins.trac.wordpress.org/browser/tainacan/trunk/classes/api/endpoints/class-tainacan-rest-background-processes-controller.php#L370 https://plugins.trac.wordpress.org/browser/tainacan/trunk/classes/api/endpoints/class-tainacan-rest-background-processes-controller.php#L378 https://plugins.trac.wordpress.org/changeset/3127693 https://www.wordfence.com/threat-intel/vulnerabilities/id/e4dd0c6a-75af-4b53-ac13-fc4ef0e9001d?source=cve • CWE-862: Missing Authorization •