CVE-2024-9988 – Crypto <= 2.15 - Authentication Bypass via register
https://notcve.org/view.php?id=CVE-2024-9988
28 Oct 2024 — The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due to missing validation on the user being supplied in the 'crypto_connect_ajax_process::register' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username. El complemento Crypto para WordPress es vulnerable a la omisión de autenticación en versiones hasta la 2.15 incluida. Esto ... • https://plugins.trac.wordpress.org/browser/crypto/tags/2.10/includes/class-crypto_connect_ajax_register.php#L91 • CWE-288: Authentication Bypass Using an Alternate Path or Channel •
CVE-2024-9990 – Crypto <= 2.15 - Cross-Site Request Forgery to Authentication Bypass
https://notcve.org/view.php?id=CVE-2024-9990
28 Oct 2024 — The Crypto plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.15. This is due to missing nonce validation in the 'crypto_connect_ajax_process::check' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. El complemento Crypto para WordPress es vulnerable a Cross-Si... • https://plugins.trac.wordpress.org/browser/crypto/tags/2.10/includes/class-crypto_connect_ajax_register.php#L31 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2024-9989 – Crypto <= 2.15 - Authentication Bypass via log_in
https://notcve.org/view.php?id=CVE-2024-9989
28 Oct 2024 — The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due a to limited arbitrary method call to 'crypto_connect_ajax_process::log_in' function in the 'crypto_connect_ajax_process' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username. El complemento Crypto para WordPress es vulnerable a la omisión de autenticación en versiones has... • https://plugins.trac.wordpress.org/browser/crypto/tags/2.10/includes/class-crypto_connect_ajax_register.php#L138 • CWE-288: Authentication Bypass Using an Alternate Path or Channel •
CVE-2022-4060 – User Post Gallery <= 2.19 - Unauthenticated RCE
https://notcve.org/view.php?id=CVE-2022-4060
26 Dec 2022 — The User Post Gallery WordPress plugin through 2.19 does not limit what callback functions can be called by users, making it possible to any visitors to run code on sites running it. El complemento User Post Gallery de WordPress hasta la versión 2.19 no limita las funciones de devolución de llamada que pueden invocar los usuarios, lo que permite a cualquier visitante ejecutar código en los sitios que lo ejecutan. The User Post Gallery - UPG plugin for WordPress is vulnerable to authorization bypass which le... • https://github.com/im-hanzou/UPGer • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2022-0449 – Flexi - Guest Submit < 4.20 - Reflected Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2022-0449
16 Feb 2022 — The Flexi WordPress plugin before 4.20 does not sanitise and escape various parameters before outputting them back in some pages such as the user dashboard, leading to a Reflected Cross-Site Scripting El plugin Flexi de WordPress versiones anteriores a 4.20, no sanea y escapa de varios parámetros antes de devolverlos en algunas páginas como el panel de control del usuario, conllevando a un ataque de tipo Cross-Site Scripting Reflejado The Flexi - Guest Submit WordPress plugin before 4.20 does not sanitise a... • https://wpscan.com/vulnerability/3cc1bb3c-e124-43d3-bc84-a493561a1387 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •