10 results (0.008 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

15 Mar 2024 — Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SupportCandy allows Stored XSS.This issue affects SupportCandy: from n/a through 3.2.3. La vulnerabilidad de neutralización incorrecta de la entrada durante la generación de páginas web ('cross-site Scripting') en SupportCandy permite XSS almacenado. Este problema afecta a SupportCandy: desde n/a hasta 3.2.3. The SupportCandy plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up t... • https://patchstack.com/database/vulnerability/supportcandy/wordpress-supportcandy-plugin-3-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 1

22 May 2023 — The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the agents[] parameter in the set_add_agent_leaves AJAX function before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. The SupportCandy plugin for WordPress is vulnerable to SQL injection via the 'agents[]' parameter used in the set_add_agent_leaves AJAX action in versions up to, and including, 3.1.6 due to insufficient escaping on the user supplied parameter and l... • https://wpscan.com/vulnerability/bdb75c8c-87e2-4358-ad3b-f4236e9a43c0 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

22 May 2023 — The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber. The SupportCandy plugin for WordPress is vulnerable to SQL injection via the 'id' parameter used in the /wp-json/supportcandy/v2/agents/ REST route in versions up to, and including, 3.1.6 due to insufficient escaping on the user supplied parameter and lack of... • https://wpscan.com/vulnerability/d9f6f4e7-a237-49c0-aba0-2934ab019e35 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 12%CPEs: 1EXPL: 1

10 Apr 2023 — The SupportCandy WordPress plugin before 3.1.5 does not validate and escape user input before using it in an SQL statement, which could allow unauthenticated attackers to perform SQL injection attacks The SupportCandy plugin for WordPress is vulnerable to SQL injection via the 'parse_user_filters' function in versions up to, and including, 3.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated... • https://wpscan.com/vulnerability/44b51a56-ff05-4d50-9327-fc9bab74d4b7 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

05 Jan 2022 — The SupportCandy WordPress plugin before 2.2.7 does not have CSRF check in the wpsc_tickets AJAX action, nor has any sanitisation or escaping in some of the filter fields which could allow attackers to make a logged in user having access to the ticket lists dashboard set an arbitrary filter (stored in their cookies) with an XSS payload in it. El plugin SupportCandy de WordPress versiones anteriores a 2.2.7, no presenta una comprobación CSRF en la acción AJAX wpsc_tickets, ni presenta ningún tipo de saneo o ... • https://wpscan.com/vulnerability/6dfb4f61-c8cb-40ad-812f-139482be0fb4 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

05 Jan 2022 — The SupportCandy WordPress plugin before 2.2.5 does not have authorisation and CSRF checks in its wpsc_tickets AJAX action, which could allow unauthenticated users to call it and delete arbitrary tickets via the set_delete_permanently_bulk_ticket setting_action. Other actions may be affected as well. El plugin de WordPress SupportCandy anterior a la versión 2.2.5 no dispone de comprobaciones de autorización y CSRF en su acción AJAX wpsc_tickets, lo que podría permitir a usuarios no autentificados llamarla y... • https://wpscan.com/vulnerability/5e6e63c2-2675-4b8d-9b94-c16c525a1a0e • CWE-862: Missing Authorization •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

05 Jan 2022 — The SupportCandy WordPress plugin before 2.2.7 does not sanitise and escape the query string before outputting it back in pages with the [wpsc_create_ticket] shortcode embed, leading to a Reflected Cross-Site Scripting issue El plugin SupportCandy de WordPress versiones anteriores a 2.2.7, no sanea y escapa la cadena de consulta antes de devolverla a las páginas con el shortcode embed [wpsc_create_ticket], conllevando a un problema de tipo Cross-Site Scripting Reflejado • https://wpscan.com/vulnerability/d2f1fd60-5e5e-4e38-9559-ba2d14ae37bf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

04 Jan 2022 — The SupportCandy WordPress plugin before 2.2.7 does not validate and escape the page attribute of its shortcode, which could allow users with a role as low as Contributor to perform Cross-Site Scripting attacks El plugin SupportCandy de WordPress versiones anteriores a 2.2.7, no comprueba ni escapa del atributo page de su shortcode, lo que podría permitir a usuarios con un rol tan bajo como el de Contribuyente llevar a cabo ataques de tipo Cross-Site Scripting • https://wpscan.com/vulnerability/09226067-0289-4d4f-9450-6f2c2ba058a0 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

04 Jan 2022 — The SupportCandy WordPress plugin before 2.2.7 does not have CRSF check in its wpsc_tickets AJAX action, which could allow attackers to make a logged in admin call it and delete arbitrary tickets via the set_delete_permanently_bulk_ticket setting_action. El plugin SupportCandy de WordPress versiones anteriores a 2.2.7, no presenta una comprobación CRSF en su acción AJAX wpsc_tickets, lo que podría permitir a atacantes hacer que un administrador con sesión iniciada la llame y elimine tickets arbitrarios por ... • https://wpscan.com/vulnerability/b71f53d7-6b9e-458c-8754-576ad2a52f7d • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.8EPSS: 5%CPEs: 1EXPL: 3

17 Apr 2019 — An Unrestricted File Upload Vulnerability in the SupportCandy plugin through 2.0.0 for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension. Una vulnerabilidad de carga de archivos sin restricción en el complemento SupportCandy versiones hasta 2.0.0 para WordPress, permite a los atacantes remotos ejecutar código arbitrario al cargar un archivo con una extensión ejecutable. • https://github.com/AngelCtulhu/CVE-2019-11223 • CWE-434: Unrestricted Upload of File with Dangerous Type •