Page 10 of 49 results (0.003 seconds)

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 2

Orbit Fox by ThemeIsle has a feature to add a registration form to both the Elementor and Beaver Builder page builders functionality. As part of the registration form, administrators can choose which role to set as the default for users upon registration. This field is hidden from view for lower-level users, however, they can still supply the user_role parameter to update the default role for registration. Orbit Fox de ThemeIsle, presenta una funcionalidad para agregar un formulario de registro a la funcionalidad de los compiladores de página Elementor and Beaver Builder. Como parte del formulario de registro, los administradores pueden elegir qué rol establecer como predeterminado para usuarios tras registrarse. • https://wpscan.com/vulnerability/d81d0e72-9bb5-47ef-a796-3b305a4b604f https://www.wordfence.com/blog/2021/01/multiple-vulnerabilities-patched-in-orbit-fox-by-themeisle-plugin • CWE-269: Improper Privilege Management •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

The RSS Aggregator by Feedzy plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.4.2. This is due to missing or incorrect nonce validation on the save_feedzy_post_type_meta() function. This makes it possible for unauthenticated attackers to update post meta via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. El complemento RSS Aggregator de Feedzy para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta la 3.4.2 incluida. Esto se debe a una validación nonce faltante o incorrecta en la función save_feedzy_post_type_meta(). • https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1 https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2 https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3 https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4 https://blo • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 2

A stored XSS vulnerability in the Visualizer plugin 3.3.0 for WordPress allows an unauthenticated attacker to execute arbitrary JavaScript when an admin or other privileged user edits the chart via the admin dashboard. This occurs because classes/Visualizer/Gutenberg/Block.php registers wp-json/visualizer/v1/update-chart with no access control, and classes/Visualizer/Render/Page/Data.php lacks output sanitization. Una vulnerabilidad de tipo XSS almacenada en el plugin Visualizer versión 3.3.0 para WordPress, permite a un atacante no autenticado ejecutar JavaScript arbitrario cuando un administrador u otro usuario privilegiado edita la tabla por medio del panel de administración. Esto ocurre porque classes/Visualizer/Gutenberg/Block.php registra wp-json/visualizer/v1/update-chart sin control de acceso, y classes/Visualizer/Render/Page/Data.php carece de saneamiento de la salida. • https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf https://wordpress.org/plugins/visualizer/#developers https://wpvulndb.com/vulnerabilities/9893 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 25%CPEs: 1EXPL: 1

A blind SSRF vulnerability exists in the Visualizer plugin before 3.3.1 for WordPress via wp-json/visualizer/v1/upload-data. Se presenta una vulnerabilidad de SSRF ciega en el plugin Visualizer versiones anteriores a 3.3.1 para WordPress por medio del archivo wp-json/visualizer/v1/upload-data. • https://nathandavison.com/blog/wordpress-visualizer-plugin-xss-and-ssrf https://wordpress.org/plugins/visualizer/#developers https://wpvulndb.com/vulnerabilities/9892 • CWE-918: Server-Side Request Forgery (SSRF) •