CVE-2022-3590 – WP <= 6.1.1 - Unauthenticated Blind SSRF via DNS Rebinding
https://notcve.org/view.php?id=CVE-2022-3590
WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden. WordPress se ve afectado por blind SSRF no autenticado en la función de pingback. Debido a una condición de ejecución TOCTOU entre las comprobaciones de validación y la solicitud HTTP, los atacantes pueden llegar a hosts internos que están explícitamente prohibidos. WordPress Core, in all known versions is vulnerable to blind Server-Side Request Forgery in its pingback feature. • https://github.com/hxlxmjxbbxs/CVE-2022-3590-WordPress-Vulnerability-Scanner https://github.com/huynhvanphuc/CVE-2022-3590-WordPress-Vulnerability-Scanner https://blog.sonarsource.com/wordpress-core-unauthenticated-blind-ssrf https://wpscan.com/vulnerability/c8814e6e-78b3-4f63-a1d3-6906a84c1f11 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2022-45847 – WordPress Countdown Widget plugin <= 3.1.9.1 - Cross-Site Request Forgery (CSRF) leading to Cross-Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2022-45847
Cross-Site Request Forgery (CSRF) vulnerability in WPAssist.Me WordPress Countdown Widget allows Cross-Site Scripting (XSS).This issue affects WordPress Countdown Widget: from n/a through 3.1.9.1. Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WPAssist.Me WordPress Countdown Widget permite cross-site scripting (XSS). Este problema afecta al widget de cuenta regresiva de WordPress: desde n/a hasta 3.1.9.1. The WordPress Countdown Widget plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.1.9.1. This is due to missing or incorrect nonce validation on the admin_header function. • https://patchstack.com/database/vulnerability/wordpress-countdown-widget/wordpress-countdown-widget-plugin-3-1-9-1-cross-site-request-forgery-csrf-leading-to-cross-site-scripting-xss?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2022-4973 – WordPress Core < 6.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via use of the_meta(); function
https://notcve.org/view.php?id=CVE-2022-4973
WordPress Core, in versions up to 6.0.2, is vulnerable to Authenticated Stored Cross-Site Scripting that can be exploited by users with access to the WordPress post and page editor, typically consisting of Authors, Contributors, and Editors making it possible to inject arbitrary web scripts into posts and pages that execute if the the_meta(); function is called on that page. • https://www.wordfence.com/threat-intel/vulnerabilities/id/b5582e89-83e6-4898-b9fe-09eddeb5f7ae?source=cve https://core.trac.wordpress.org/changeset/53961 https://wordpress.org/news/2022/08/wordpress-6-0-2-security-and-maintenance-release https://www.wordfence.com/blog/2022/08/wordpress-core-6-0-2-security-maintenance-release-what-you-need-to-know • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-1591 – WordPress Ping Optimizer < 2.35.1.3.0 - Arbitrary Settings Update via CSRF
https://notcve.org/view.php?id=CVE-2022-1591
The WordPress Ping Optimizer WordPress plugin before 2.35.1.3.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack El plugin Ping Optimizer de WordPress versiones anteriores a 2.35.1.3.0, no presenta una comprobación de tipo CSRF cuando es actualizada su configuración, lo que podría permitir a atacantes hacer que un administrador conectado los cambie por medio de un ataque de tipo CSRF The WordPress Ping Optimizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.35.1.2.3. This is due to missing or incorrect nonce validation on the cbnetpoOptionsPg function. This makes it possible for unauthenticated attackers to update plugin settings, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. CVE-2022-30705 appears to be a duplicate of this vulnerability. • https://wpscan.com/vulnerability/b1a52c7e-3422-40dd-af5a-ea4c622a87aa • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2022-29427 – WordPress Disable Right Click For WP plugin <= 1.1.6 - Cross-Site Request Forgery (CSRF) vulnerability
https://notcve.org/view.php?id=CVE-2022-29427
Cross-Site Request Forgery (CSRF) vulnerability in Aftab Muni's Disable Right Click For WP plugin <= 1.1.6 at WordPress. Una vulnerabilidad de tipo Cross-Site Request Forgery (CSRF) en el plugin Disable Right Click For WP de Aftab Muni versiones anteriores a 1.1.6 incluyéndola, en WordPress • https://patchstack.com/database/vulnerability/disable-right-click-for-wp/wordpress-disable-right-click-for-wp-plugin-1-1-6-cross-site-request-forgery-csrf-vulnerability https://wordpress.org/plugins/disable-right-click-for-wp/#developers • CWE-352: Cross-Site Request Forgery (CSRF) •