Page 10 of 53 results (0.009 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to deserialization of untrusted input via the 'remote_data' parameter in versions up to, and including 3.7.9. This makes it possible for authenticated attackers with contributor privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload. El plugin The Visualizer: Tables and Charts Manager para WordPress es vulnerable a una deserialización de entradas no confiables por medio del parámetro "remote_data" en versiones hasta la 3.7.9 incluyéndola. Esto hace posible que atacantes autenticados con privilegios de contribuyente y superiores llamen a los archivos usando una envoltura PHAR que de serializará los datos y llamará a Objetos PHP arbitrarios que pueden ser usados para llevar a cabo una variedad de acciones maliciosas concedidas una cadena POP también está presente. • https://github.com/Codeinwp/visualizer/blob/master/classes/Visualizer/Module/Chart.php#L1115 https://github.com/Codeinwp/visualizer/blob/master/classes/Visualizer/Source/Csv.php https://github.com/Codeinwp/visualizer/compare/v3.7.9...v3.7.10 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2752058%40visualizer&new=2752058%40visualizer&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/d9606d92-8061-4dfc-a6e2-509b54613277?source=cve https • CWE-502: Deserialization of Untrusted Data •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The WP Maintenance Mode & Coming Soon WordPress plugin before 2.4.5 is lacking CSRF when emptying the subscribed users list, which could allow attackers to make a logged in admin perform such action via a CSRF attack El plugin WP Maintenance Mode & Coming Soon de WordPress versiones anteriores a 2.4.5, carece de comprobación de tipo CSRF cuando vacía la lista de usuarios suscritos, lo que podría permitir a atacantes hacer que un administrador con sesión iniciada lleve a cabo dicha acción por medio de un ataque de tipo CSRF The WP Maintenance Mode & Coming Soon plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.4.4. This is due to missing nonce validation on the reset_plugin_settings, subscribers_empty_list, dismiss_notices, subscribers_export, add_subscriber, & send_contact functions. This makes it possible for unauthenticated attackers to perform a variety of actions such as emptying the subscribers list and resetting the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/68deab46-1c16-46ae-a912-a104958ca4cf • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.3EPSS: 0%CPEs: 425EXPL: 0

The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable. • https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=cve https://wpscan.com/vulnerability/6dae6dca-7474-4008-9fe5-4c62b9f12d0a https://freemius.com/blog/managing-security-issues-open-source-freemius-sdk-security-disclosure https://wpdirectory.net/search/01FWPVWA7BC5DYGZHNSZQ9QMN5 https://wpdirectory.net/search/01G02RSGMFS1TPT63FS16RWEYR https://web.archive.org/web/20220225174410/https%3A//www.pluginvulnerabilities.com/2022/02/25/our-security-review-of-wordpress-plugin-found-freemius-li • CWE-862: Missing Authorization •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 2

Orbit Fox by ThemeIsle has a feature to add custom scripts to the header and footer of a page or post. There were no checks to verify that a user had the unfiltered_html capability prior to saving the script tags, thus allowing lower-level users to inject scripts that could potentially be malicious. Orbit Fox de ThemeIsle, presenta una funcionalidad para añadir scripts personalizados en el encabezado y el pie de página de una página o publicación. No había comprobaciones para verificar que un usuario tenía la capacidad unfiltered_html antes de guardar las etiquetas de los scripts, lo que permitía a usuarios de nivel inferior inyectar scripts que podían ser potencialmente maliciosos Orbit Fox by ThemeIsle has a feature to add custom scripts to the header and footer of a page or post. There were no checks to verify that a user had the unfiltered_html capability prior to saving the script tags, thus allowing lower-level users to inject scripts that could potentially be malicious in versions up to, and including 2.10.2. • https://wpscan.com/vulnerability/28e42f4e-e38a-4bf4-b51b-d8f21c40f037 https://www.wordfence.com/blog/2021/01/multiple-vulnerabilities-patched-in-orbit-fox-by-themeisle-plugin • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.9EPSS: 0%CPEs: 1EXPL: 2

Orbit Fox by ThemeIsle has a feature to add a registration form to both the Elementor and Beaver Builder page builders functionality. As part of the registration form, administrators can choose which role to set as the default for users upon registration. This field is hidden from view for lower-level users, however, they can still supply the user_role parameter to update the default role for registration. Orbit Fox de ThemeIsle, presenta una funcionalidad para agregar un formulario de registro a la funcionalidad de los compiladores de página Elementor and Beaver Builder. Como parte del formulario de registro, los administradores pueden elegir qué rol establecer como predeterminado para usuarios tras registrarse. • https://wpscan.com/vulnerability/d81d0e72-9bb5-47ef-a796-3b305a4b604f https://www.wordfence.com/blog/2021/01/multiple-vulnerabilities-patched-in-orbit-fox-by-themeisle-plugin • CWE-269: Improper Privilege Management •