Page 2 of 14 results (0.014 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The YITH WooCommerce Gift Cards plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_mail_status' and 'save_email_settings' functions in all versions up to, and including, 4.12.0. This makes it possible for unauthenticated attackers to modify WooCommerce settings. El complemento YITH WooCommerce Gift Cards para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificación de capacidad en las funciones 'save_mail_status' y 'save_email_settings' en todas las versiones hasta la 4.12.0 incluida. Esto hace posible que atacantes no autenticados modifiquen la configuración de WooCommerce. • https://plugins.trac.wordpress.org/changeset/3084519/yith-woocommerce-gift-cards/trunk/includes/admin/class-ywgc-admin.php https://www.wordfence.com/threat-intel/vulnerabilities/id/ca1f0dc6-c0bc-4e9f-b3b6-d6274aa7a7db?source=cve • CWE-285: Improper Authorization •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 0

Deserialization of Untrusted Data vulnerability in YITH YITH WooCommerce Product Add-Ons.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.3.0. Vulnerabilidad de deserialización de datos no confiables en YITH YITH WooCommerce Product Add-Ons. Este problema afecta a YITH WooCommerce Product Add-Ons: desde n/a hasta 4.3.0. The YITH WooCommerce Product Add-Ons plugin for WordPress is vulnerable to PHP Object Injection in all versions up to 4.3.1 (exclusive) via deserialization of untrusted input in the 'save_addon' function. This makes it possible for authenticated attackers, with Shop Manager access and above, to inject a PHP Object. • https://patchstack.com/database/vulnerability/yith-woocommerce-product-add-ons/wordpress-yith-woocommerce-product-add-ons-extra-options-plugin-4-3-0-php-object-injection-vulnerability?_s_id=cve • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Unauth. Arbitrary File Upload vulnerability in YITH WooCommerce Gift Cards premium plugin <= 3.19.0 on WordPress. Vulnerabilidad de carga de archivos arbitrarios no autorizadas en el complemento YITH WooCommerce Gift Cards premium en versiones &lt;= 3.19.0 en WordPress. The Yith WooCommerce Gift Cards Premium plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation and capability checks in the import_actions_from_settings_panel function in versions up to, and including, 3.19.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.  • https://patchstack.com/database/vulnerability/yith-woocommerce-gift-cards-premium/wordpress-yith-woocommerce-gift-cards-premium-plugin-3-19-0-unauth-arbitrary-file-upload-vulnerability?_s_id=cve • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The WooCommerce Affiliate Plugin WordPress plugin before 4.16.4.5 does not have authorization and CSRF checks on a specific action handler, as well as does not sanitize its settings, which enables an unauthenticated attacker to inject malicious XSS payloads into the settings page of the plugin. El plugin WooCommerce Affiliate Plugin de WordPress versiones anteriores a 4.16.4.5, no presenta comprobaciones de autorización y de tipo CSRF en un manejador de acción específico, así como no sanea su configuración, lo que permite a un atacante no autenticado inyectar cargas útiles de tipo XSS maliciosas en la página de configuración del plugin • https://wpscan.com/vulnerability/c43fabb4-b388-462c-adc4-c6b25af7043b • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in YITH Maintenance Mode (WordPress plugin) versions <= 1.3.8, there are 46 vulnerable parameters that were missed by the vendor while patching the 1.3.7 version to 1.3.8. Vulnerable parameters: 1 - "Newsletter" tab, &yith_maintenance_newsletter_submit_label parameter: payload should start with a single quote (') symbol to break the context, i.e.: NOTIFY ME' autofocus onfocus=alert(/Visse/);// v=' - this payload will be auto triggered while admin visits this page/tab. 2 - "General" tab issues, vulnerable parameters: &yith_maintenance_message, &yith_maintenance_custom_style, &yith_maintenance_mascotte, &yith_maintenance_title_font[size], &yith_maintenance_title_font[family], &yith_maintenance_title_font[color], &yith_maintenance_paragraph_font[size], &yith_maintenance_paragraph_font[family], &yith_maintenance_paragraph_font[color], &yith_maintenance_border_top. 3 - "Background" tab issues, vulnerable parameters: &yith_maintenance_background_image, &yith_maintenance_background_color. 4 - "Logo" tab issues, vulnerable parameters: &yith_maintenance_logo_image, &yith_maintenance_logo_tagline, &yith_maintenance_logo_tagline_font[size], &yith_maintenance_logo_tagline_font[family], &yith_maintenance_logo_tagline_font[color]. 5 - "Newsletter" tab issues, vulnerable parameters: &yith_maintenance_newsletter_email_font[size], &yith_maintenance_newsletter_email_font[family], &yith_maintenance_newsletter_email_font[color], &yith_maintenance_newsletter_submit_font[size], &yith_maintenance_newsletter_submit_font[family], &yith_maintenance_newsletter_submit_font[color], &yith_maintenance_newsletter_submit_background, &yith_maintenance_newsletter_submit_background_hover, &yith_maintenance_newsletter_title, &yith_maintenance_newsletter_action, &yith_maintenance_newsletter_email_label, &yith_maintenance_newsletter_email_name, &yith_maintenance_newsletter_submit_label, &yith_maintenance_newsletter_hidden_fields. 6 - "Socials" tab issues, vulnerable parameters: &yith_maintenance_socials_facebook, &yith_maintenance_socials_twitter, &yith_maintenance_socials_gplus, &yith_maintenance_socials_youtube, &yith_maintenance_socials_rss, &yith_maintenance_socials_skype, &yith_maintenance_socials_email, &yith_maintenance_socials_behance, &yith_maintenance_socials_dribble, &yith_maintenance_socials_flickr, &yith_maintenance_socials_instagram, &yith_maintenance_socials_pinterest, &yith_maintenance_socials_tumblr, &yith_maintenance_socials_linkedin. Múltiples vulnerabilidades de tipo Cross-Site Scripting (XSS) Almacenado y Autenticado en YITH Maintenance Mode (plugin de WordPress) versiones anteriores a 1.3.8 incluyéndola, hay 46 parámetros vulnerables que fueron pasados por alto por el proveedor mientras parcheaba la versión 1.3.7 a la 1.3.8. Parámetros vulnerables: 1 - Pestaña "Newsletter", parámetro &amp;yith_maintenance_newsletter_submit_label: el payload debe comenzar con un símbolo de comillas simples (') para romper el contexto, es decir: NOTIFY ME' autofocus onfocus=alert(/Visse/);// v=' - este payload se autodesencadenará mientras el administrador visite esta página/pestaña. 2 - Problemas de la pestaña "General", parámetros vulnerables: &amp;yith_maintenance_message, &amp;yith_maintenance_custom_style, &amp;yith_maintenance_mascotte, &amp;yith_maintenance_title_font[size], &amp;yith_maintenance_title_font[family], &amp;yith_maintenance_title_font[color], &amp;yith_maintenance_paragraph_font[size], &amp;yith_maintenance_paragraph_font[family], &amp;yith_maintenance_paragraph_font[color], &amp;yith_maintenance_border_top. 3 - Problemas con la pestaña "Background", parámetros vulnerables: &amp;yith_maintenance_background_image, &amp;yith_maintenance_background_color. 4 - Problemas con la pestaña "Logo", parámetros vulnerables: &amp;yith_maintenance_logo_image, &amp;yith_maintenance_logo_tagline_font, &amp;yith_maintenance_logo_tagline_font[size], &amp;yith_maintenance_logo_tagline_font[family], &amp;yith_maintenance_logo_tagline_font[color]. 5 - Problemas con la pestaña "Newsletter", parámetros vulnerables: &amp;yith_maintenance_newsletter_email_font[size], &amp;yith_maintenance_newsletter_email_font[family], &amp;yith_maintenance_newsletter_email_font[color], &amp;yith_maintenance_newsletter_submit_font[size], &amp;yith_maintenance_newsletter_submit_font[family], &amp;yith_maintenance_newsletter_submit_font[color], &amp;yith_maintenance_newsletter_submit_background, &amp;yith_maintenance_newsletter_submit_background_hover, &amp;yith_maintenance_newsletter_title, &amp;yith_maintenance_newsletter_action, &amp;yith_maintenance_newsletter_email_label, &amp;yith_maintenance_newsletter_email_name, &amp;yith_maintenance_newsletter_submit_label, &amp;yith_maintenance_newsletter_hidden_fields. 6 - Problemas de la pestaña "Socials", parámetros vulnerables: &amp;yith_maintenance_socials_facebook, &amp;yith_maintenance_socials_twitter, &amp;yith_maintenance_socials_gplus, &amp;yith_maintenance_socials_youtube, &amp;yith_maintenance_socials_rss, &amp;yith_maintenance_socials_skype, &amp;yith_maintenance_socials_email, &amp;yith_maintenance_socials_behance, &amp;yith_maintenance_socials_dribble, &amp;yith_maintenance_socials_flickr, &amp;yith_maintenance_socials_instagram, &amp;yith_maintenance_socials_pinterest, &amp;yith_maintenance_socials_tumblr, &amp;yith_maintenance_socials_linkedin • https://patchstack.com/database/vulnerability/yith-maintenance-mode/wordpress-yith-maintenance-mode-plugin-1-3-8-multiple-authenticated-stored-cross-site-scripting-xss-vulnerabilities https://wordpress.org/plugins/yith-maintenance-mode/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •