CVE-2023-5644 – WP Mail Log < 1.1.3 – Incorrect Authorization in REST API Endpoints
https://notcve.org/view.php?id=CVE-2023-5644
The WP Mail Log WordPress plugin before 1.1.3 does not correctly authorize its REST API endpoints, allowing users with the Contributor role to view and delete data that should only be accessible to Admin users. El complemento WP Mail Log WordPress anterior a 1.1.3 no autoriza correctamente sus endpoint de API REST, lo que permite a los usuarios con el rol de Colaborador ver y eliminar datos a los que solo deberían tener acceso los usuarios administradores. The WP Mail Log plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the check_permission() function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with contributor-level access and above, to access REST routes that they should not have access to and delete data. • https://wpscan.com/vulnerability/08f1d623-0453-4103-a9aa-2d0ddb6eb69e • CWE-863: Incorrect Authorization •
CVE-2023-5645 – WP Mail Log < 1.1.3 – Contributor+ SQL Injection in wml_logs endpoint
https://notcve.org/view.php?id=CVE-2023-5645
The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor. El complemento WP Mail Log WordPress anterior a 1.1.3 no sanitiza ni escapa adecuadamente un parámetro antes de usarlo en una declaración SQL, lo que lleva a una inyección SQL explotable por usuarios con un rol tan bajo como Colaborador. The WP Mail Log plugin for WordPress is vulnerable to SQL Injection via the 'key'’ parameter in all versions up to, and including, 1.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://wpscan.com/vulnerability/e392fb53-66e9-4c43-9e4f-f4ea7c561551 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2023-5672 – WP Mail Log < 1.1.3 – Contributor+ LFI in wml_logs/send_mail endpoint
https://notcve.org/view.php?id=CVE-2023-5672
The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file path parameters when attaching files to emails, leading to local file inclusion, and allowing an attacker to leak the contents of arbitrary files. El complemento WP Mail Log WordPress anterior a 1.1.3 no valida correctamente los parámetros de ruta de archivo al adjuntar archivos a correos electrónicos, lo que provoca la inclusión de archivos locales y permite que un atacante filtre el contenido de archivos arbitrarios. The WP Mail Log plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.1.2 via the includeAttachment parameter. This makes it possible for authenticated attackers, with contributor-level access and above, to include and read arbitrary files on the server. • https://wpscan.com/vulnerability/7c1dff5b-bed3-49f8-96cc-1bc9abe78749 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2023-5674 – WP Mail Log < 1.1.3 – Contributor+ SQL Injection in wml_logs/send_mail endpoint
https://notcve.org/view.php?id=CVE-2023-5674
The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor. El complemento WP Mail Log WordPress anterior a 1.1.3 no sanitiza ni escapa adecuadamente un parámetro antes de usarlo en una declaración SQL, lo que lleva a una inyección SQL explotable por usuarios con un rol tan bajo como Colaborador. The WP Mail Log plugin for WordPress is vulnerable to SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for contributor and higher users to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://wpscan.com/vulnerability/32a23d0d-7ece-4870-a99d-f3f344be2d67 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2023-47530 – WordPress Redirect 404 Error Page to Homepage or Custom Page with Logs Plugin <= 1.8.7 is vulnerable to SQL Injection
https://notcve.org/view.php?id=CVE-2023-47530
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPVibes Redirect 404 Error Page to Homepage or Custom Page with Logs allows SQL Injection.This issue affects Redirect 404 Error Page to Homepage or Custom Page with Logs: from n/a through 1.8.7. La neutralización incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyección SQL') en WPVibes Redirect 404 Error Page to Homepage or Custom Page with Logs permite la inyección de SQL. Este problema afecta a Redirect 404 Error Page to Homepage or Custom Page with Logs: de n/a hasta 1.8.7. The Redirect 404 Error Page to Homepage or Custom Page with Logs plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.8.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://patchstack.com/database/vulnerability/redirect-404-error-page-to-homepage-or-custom-page/wordpress-redirect-404-error-page-to-homepage-or-custom-page-with-logs-plugin-1-8-7-sql-injection-vulnerability?_s_id=cve • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •