Page 2 of 8 results (0.004 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, any authenticated user, such as a subscriber, could use the various AJAX actions in the plugin to do a variety of things. For example, an attacker could use wpcf7r_reset_settings to reset the plugin’s settings, wpcf7r_add_action to add actions to a form, and more. En el plugin de WordPress Redirection for Contact Form versiones 7 anteriores a 2.3.4, cualquier usuario autenticado, como un suscriptor, puede usar las diversas acciones AJAX en el plugin para hacer una variedad de cosas. Por ejemplo, un atacante podría usar la función wpcf7r_reset_settings para restablecer la configuración del plugin, la función wpcf7r_add_action para agregar acciones a un formulario y más • https://wpscan.com/vulnerability/def87e69-bade-431b-b101-d463a26406e9 https://www.wordfence.com/blog/2021/04/severe-vulnerabilities-patched-in-redirection-for-contact-form-7-plugin • CWE-862: Missing Authorization CWE-863: Incorrect Authorization •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 2

In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, any authenticated user, such as a subscriber, could use the delete_action_post AJAX action to delete any post on a target site. En el plugin de WordPress Redirection for Contact Form versiones 7 anteriores a 2.3.4, cualquier usuario autenticado, como un suscriptor, podía usar la acción delete_action_post AJAX para eliminar cualquier publicación en un sitio de destino • https://wpscan.com/vulnerability/daf12b85-f5ad-4261-ab39-be6840ad3cdc https://www.wordfence.com/blog/2021/04/severe-vulnerabilities-patched-in-redirection-for-contact-form-7-plugin • CWE-863: Incorrect Authorization •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 2

In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, any authenticated user, such as a subscriber, could use the import_from_debug AJAX action to inject PHP objects. En el plugin de WordPress Redirection for Contact Form versiones 7 anteriores a 2.3.4, cualquier usuario autenticado, como un suscriptor, podía usar la acción AJAX import_from_debug para inyectar objetos PHP • https://wpscan.com/vulnerability/db4ba6b0-887e-4ec1-8935-ab21d369b329 https://www.wordfence.com/blog/2021/04/severe-vulnerabilities-patched-in-redirection-for-contact-form-7-plugin • CWE-502: Deserialization of Untrusted Data •