Page 2 of 46 results (0.004 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The Active Directory Integration / LDAP Integration plugin for WordPress is vulnerable to LDAP Passback in versions up to, and including, 4.1.10. This is due to insufficient validation when changing the LDAP server. This makes it possible for authenticated attackers, with administrative access and above, to change the LDAP server and retrieve the credentials for the original LDAP server. El complemento de integración de Active Directory Integration / LDAP para WordPress es vulnerable a LDAP Passback en versiones hasta la 4.1.10 inclusive. Esto se debe a una validación insuficiente al cambiar el servidor LDAP. • https://medium.com/%40cybertrinchera/cve-2023-4506-cve-2023-4505-ldap-passback-on-miniorange-plugins-ca7328c84313 https://wordpress.org/plugins/ldap-login-for-intranet-sites https://www.wordfence.com/threat-intel/vulnerabilities/id/0585969d-dd08-4058-9d72-138a55a2cdf1?source=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

The Active Directory Integration / LDAP Integration WordPress plugin before 4.1.10 stores sensitive LDAP logs in a buffer file when an administrator wants to export said logs. Unfortunately, this log file is never removed, and remains accessible to any users knowing the URL to do so. El complemento Active Directory Integration / LDAP Integration de WordPress anterior a 4.1.10 almacena registros LDAP confidenciales en un archivo de búfer cuando un administrador desea exportar dichos registros. Desafortunadamente, este archivo de registro nunca se elimina y permanece accesible para cualquier usuario que conozca la URL para hacerlo. The Active Directory Integration / LDAP Integration plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.1.9 via log files that are left over and not deleted. • https://wpscan.com/vulnerability/91f4e500-71f3-4ef6-9cc7-24a7c12a5748 • CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The Staff / Employee Business Directory for Active Directory WordPress plugin before 1.2.3 does not sanitize and escape data returned from the LDAP server before rendering it in the page, allowing users who can control their entries in the LDAP directory to inject malicious javascript which could be used against high-privilege users such as a site admin. El complemento de WordPress Staff / Employee Business Directory para Active Directory anterior a 1.2.3 no sanitiza ni escapa los datos devueltos por el servidor LDAP antes de representarlos en la página, lo que permite a los usuarios que pueden controlar sus entradas en el directorio LDAP inyectar javascript malicioso que podría usarse contra usuarios con altos privilegios, como un administrador de sitio. The Staff / Employee Business Directory for Active Directory plugin for WordPress is vulnerable to improper LDAP value escaping in versions up to, and including, 1.2.1. This is due to insufficient escaping on the supplied $user_field_data value. This makes it possible for authenticated attackers with access to edit their LDAP entries to inject malicious JavaScript that will access when a user accesses a page containing the data. • https://wpscan.com/vulnerability/0b953413-cf41-4de7-ac1f-c6cb995fb158 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-116: Improper Encoding or Escaping of Output •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The SAML SP Single Sign On plugin for WordPress is vulnerable to unauthorized notice dismissal due to a missing capability check on the close_welcome_modal function in versions up to, and including, 5.0.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to dismiss the welcome tour of the plugin. • CWE-862: Missing Authorization •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

The Prevent files / folders access WordPress plugin before 2.5.2 does not validate files to be uploaded, which could allow attackers to upload arbitrary files such as PHP on the server. El complemento Impedir el acceso a archivos/carpetas de WordPress anteriores a 2.5.2 no valida los archivos que se cargarán, lo que podría permitir a los atacantes cargar archivos arbitrarios como PHP en el servidor. The Prevent files / folders access plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the mo_media_restrict_page function in versions up to, and including, 2.5.1. This makes it possible for authenticated attackers, with administrator-level privileges and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://github.com/codeb0ss/CVE-2023-4238-PoC https://wpscan.com/vulnerability/53816136-4b1a-4b7d-b73b-08a90c2a638f • CWE-434: Unrestricted Upload of File with Dangerous Type •