Page 2 of 8 results (0.006 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The Essential Real Estate WordPress plugin before 4.4.0 does not apply proper capability checks on its AJAX actions, which among other things, allow attackers with a subscriber account to conduct Stored XSS attacks. El complemento Essential Real Estate de WordPress anterior a 4.4.0 no aplica comprobaciones de capacidad adecuadas en sus acciones AJAX, que, entre otras cosas, permiten a atacantes con una cuenta de suscriptor realizar ataques XSS almacenados. The Essential Real Estate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'font[0][selector]' parameter in all versions up to, and including, 4.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above,]to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/df12513b-9664-45be-8824-2924bfddf364 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The Essential Real Estate plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'ajaxUploadFonts' function in versions up to, and including, 4.3.5. This makes it possible for authenticated attackers with subscriber-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible. El complemento Essential Real Estate para WordPress es vulnerable a cargas de archivos arbitrarias debido a una validación insuficiente del tipo de archivo en la función 'ajaxUploadFonts' en versiones hasta la 4.3.5 incluida. Esto hace posible que atacantes autenticados con capacidades de nivel de suscriptor o superior carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecución remota de código. The Essential Real Estate plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation on the 'ajaxUploadFonts' function in versions up to, and including, 4.3.5. • https://plugins.trac.wordpress.org/browser/essential-real-estate/tags/4.3.5/lib/smart-framework/core/fonts/fonts.class.php#L524 https://plugins.trac.wordpress.org/changeset/3009780/essential-real-estate https://www.wordfence.com/threat-intel/vulnerabilities/id/8bb2ce22-077b-41dd-a2ff-cc1db9d20d38?source=cve • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Essential Real Estate WordPress plugin before 3.9.6 does not sanitize and escapes some parameters, which could allow users with a role as low as Admin to perform Cross-Site Scripting attacks. El complemento Essential Real Estate de WordPress anterior a 3.9.6 no sanitiza y escapa a algunos parámetros, lo que podría permitir a los usuarios con un rol tan bajo como Administrador realizar ataques de Cross-Site Scripting. The Essential Real Estate plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 3.9.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/6395f3f1-5cdf-4c55-920c-accc0201baf4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •