CVE-2024-8485 – REST API TO MiniProgram <= 4.7.1 - Unauthenticated Arbitrary User Email Update and Privilege Escalation via Account Takeover
https://notcve.org/view.php?id=CVE-2024-8485
24 Sep 2024 — The REST API TO MiniProgram plugin for WordPress is vulnerable to privilege escalation via account takeovr in all versions up to, and including, 4.7.1 via the updateUserInfo() due to missing validation on the 'openid' user controlled key that determines what user will be updated. • https://plugins.trac.wordpress.org/browser/rest-api-to-miniprogram/tags/4.7.0/includes/api/ram-rest-weixin-controller.php#L264 • CWE-639: Authorization Bypass Through User-Controlled Key •
CVE-2024-44014 – WordPress Vmax Project Manager plugin <= 1.0 - Local File Inclusion to RCE vulnerability
https://notcve.org/view.php?id=CVE-2024-44014
24 Sep 2024 — The Vmax Project Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0. • https://patchstack.com/database/vulnerability/vmax-project-manager/wordpress-vmax-project-manager-plugin-1-0-local-file-inclusion-to-rce-vulnerability? • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') •
CVE-2024-8275 – The Events Calendar <= 6.6.4 - Unauthenticated SQL Injection
https://notcve.org/view.php?id=CVE-2024-8275
24 Sep 2024 — The The Events Calendar plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the 'tribe_has_next_event' function in all versions up to, and including, 6.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. • https://github.com/nothe1senberg/CVE-2024-8275 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-8943 – LatePoint <= 5.0.12 - Authentication Bypass
https://notcve.org/view.php?id=CVE-2024-8943
24 Sep 2024 — The LatePoint plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.0.12. ... Note that logging in as a WordPress user is only possible if the "Use WordPress users as customers" setting is enabled, which is disabled by default. • https://wpdocs.latepoint.com/changelog • CWE-288: Authentication Bypass Using an Alternate Path or Channel •
CVE-2024-8791 – Donation Forms by Charitable – Donations Plugin & Fundraising Platform for WordPress <= 1.8.1.14 - Insecure Direct Object Reference to Account Takeover and Privilege Escalation
https://notcve.org/view.php?id=CVE-2024-8791
23 Sep 2024 — The Donation Forms by Charitable – Donations Plugin & Fundraising Platform for WordPress plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.8.1.14. • https://plugins.trac.wordpress.org/browser/charitable/tags/1.8.1.14/includes/users/class-charitable-user.php#L872 • CWE-639: Authorization Bypass Through User-Controlled Key •
CVE-2024-8795 – BA Book Everything <= 1.6.20 - Cross-Site Request Forgery to Email Address Update/Account Takeover
https://notcve.org/view.php?id=CVE-2024-8795
23 Sep 2024 — The BA Book Everything plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6.20. • https://plugins.trac.wordpress.org/browser/ba-book-everything/tags/1.6.20/includes/class-babe-my-account.php#L562 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2024-8911 – LatePoint <= 5.0.11 - Unauthenticated Arbitrary User Password Change via SQL Injection
https://notcve.org/view.php?id=CVE-2024-8911
20 Sep 2024 — The LatePoint plugin for WordPress is vulnerable to Arbitrary User Password Change via SQL Injection in versions up to, and including, 5.0.11. ... Note that changing a WordPress user's password is only possible if the "Use WordPress users as customers" setting is enabled, which is disabled by default. • https://wpdocs.latepoint.com/changelog • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-8853 – Webo-facto <= 1.40 - Unauthenticated Privilege Escalation
https://notcve.org/view.php?id=CVE-2024-8853
17 Sep 2024 — The Webo-facto plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.40 due to insufficient restriction on the 'doSsoAuthentification' function. ... El complemento Webo-facto para WordPress es vulnerable a la escalada de privilegios en versiones hasta la 1.40 incluida debido a una restricción insuficiente en la función 'doSsoAuthentification'. • https://plugins.trac.wordpress.org/browser/webo-facto-connector/tags/1.40/WeboFacto/Sso.php#L78 • CWE-269: Improper Privilege Management •
CVE-2024-9796 – WP-Advanced-Search < 3.3.9.2 - Unauthenticated SQL Injection
https://notcve.org/view.php?id=CVE-2024-9796
17 Sep 2024 — The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks El complemento WP-Advanced-Search para WordPress anterior a la versión 3.3.9.2 no desinfecta ni escapa el parámetro t antes de usarlo en una declaración SQL, lo que permite que usuarios no autenticados realicen ataques de inyección SQL. The WordPress WP-Advanced-Search plugin for WordPre... • https://github.com/RandomRobbieBF/CVE-2024-9796 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2024-44004 – WordPress WPCargo Track & Trace plugin <= 7.0.6 - SQL Injection vulnerability
https://notcve.org/view.php?id=CVE-2024-44004
16 Sep 2024 — The WPCargo Track & Trace plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 7.0.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. • https://patchstack.com/database/vulnerability/wpcargo/wordpress-wpcargo-track-trace-plugin-7-0-6-sql-injection-vulnerability? • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •