2 results (0.003 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) vulnerability in Mathieu Chartier WordPress WP-Advanced-Search plugin <= 3.3.8 versions. The WP-Advanced-Search plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.3.8. This is due to missing or incorrect nonce validation on the 'WP_Advanced_Search_update_pagination', 'WP_Advanced_Search_update_styles', 'WP_Advanced_Search_Autocomplete_Action, and possibly other functions. This makes it possible for unauthenticated attackers to update certain plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://patchstack.com/database/vulnerability/wp-advanced-search/wordpress-wp-advanced-search-plugin-3-3-8-cross-site-request-forgery-csrf?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The Import feature in the wp-advanced-search plugin 3.3.6 for WordPress is vulnerable to authenticated SQL injection via an uploaded .sql file. An attacker can use this to execute SQL commands without any validation. La funcionalidad Import del plugin wp-advanced-search versión 3.3.6 para WordPress, es vulnerable a una inyección SQL autenticada por medio de un archivo .sql cargado. Un atacante puede usar esto para ejecutar comandos SQL sin ninguna comprobación. • https://wordpress.org/plugins/wp-advanced-search/#developers https://wpvulndb.com/vulnerabilities/10199 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •