Page 3 of 18 results (0.006 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) in Access Demo Importer <= 1.0.7 on WordPress allows an attacker to activate any installed plugin. Una vulnerabilidad de tipo Cross-Site Request Forgery (CSRF) en Access Demo Importer versiones anteriores a 1.0.7 incluyéndola en WordPress, permite a un atacante activar cualquier plugin instalado A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to unauthorized plugin deactivation and activation via the plugin_activation_callback and plugin_deactivate_callback functions called via AJAX actions that were missing capability checks and nonce validation. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to deactivate and activate arbitrary plugins. This could be used to deactivate security plugins and exploit other potential vulnerabilities. • https://patchstack.com/database/vulnerability/access-demo-importer/wordpress-access-demo-importer-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability-leading-to-arbitrary-plugin-activation https://wordpress.org/plugins/access-demo-importer/#developers • CWE-352: Cross-Site Request Forgery (CSRF) CWE-862: Missing Authorization •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The Cookie Notification Plugin for WordPress plugin before 1.0.9 does not sanitise or escape the id GET parameter before using it in a SQL statement, when retrieving the setting to edit in the admin dashboard, leading to an authenticated SQL Injection El plugin Cookie Notification Plugin para WordPress versiones anteriores a 1.0.9, no sanea o escapa del parámetro id GET antes de usarlo en una sentencia SQL, cuando recupera la configuración para editar en el panel de administración, conllevando a una inyección SQL autenticada • https://wpscan.com/vulnerability/9bd1c040-09cc-4c2d-88c9-8406a653a48b • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 0%CPEs: 93EXPL: 2

Numerous Plugins and Themes from the AccessPress Themes (aka Access Keys) vendor are backdoored due to their website being compromised. Only plugins and themes downloaded via the vendor website are affected, and those hosted on wordpress.org are not. However, all of them were updated or removed to avoid any confusion Numerosos plugins y temas del proveedor de AccessPress Themes (también se conoce como Access Keys) han sido perjudicados debido a que su sitio web ha sido comprometido. Sólo están afectados los plugins y temas descargados por medio del sitio web del proveedor, no así los alojados en wordpress.org. Sin embargo, todos ellos fueron actualizados o eliminados para evitar cualquier confusión • https://jetpack.com/2022/01/18/backdoor-found-in-themes-and-plugins-from-accesspress-themes https://wpscan.com/vulnerability/9c76bada-fa32-4c2f-9855-d0efd1e63eff • CWE-912: Hidden Functionality •

CVSS: 8.8EPSS: 0%CPEs: 43EXPL: 1

A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. The complete list of affected products and their versions are below: WordPress Plugin: AccessPress Demo Importer <=1.0.6 WordPress Themes: accesspress-basic <= 3.2.1 accesspress-lite <= 2.92 accesspress-mag <= 2.6.5 accesspress-parallax <= 4.5 accesspress-root <= 2.5 accesspress-store <= 2.4.9 agency-lite <= 1.1.6 arrival <= 1.4.2 bingle <= 1.0.4 bloger <= 1.2.6 brovy <= 1.3 construction-lite <= 1.2.5 doko <= 1.0.27 edict-lite <= 1.1.4 eightlaw-lite <= 2.1.5 eightmedi-lite <= 2.1.8 eight-sec <= 1.1.4 eightstore-lite <= 1.2.5 enlighten <= 1.3.5 fotography <= 2.4.0 opstore <= 1.4.3 parallaxsome <= 1.3.6 punte <= 1.1.2 revolve <= 1.3.1 ripple <= 1.2.0 sakala <= 1.0.4 scrollme <= 2.1.0 storevilla <= 1.4.1 swing-lite <= 1.1.9 the100 <= 1.1.2 the-launcher <= 1.3.2 the-monday <= 1.4.1 ultra-seven <= 1.2.8 uncode-lite <= 1.3.3 vmag <= 1.2.7 vmagazine-lite <= 1.3.5 vmagazine-news <= 1.0.5 wpparallax <= 2.0.6 wp-store <= 1.1.9 zigcy-baby <= 1.0.6 zigcy-cosmetics <= 1.0.5 zigcy-lite <= 2.0.9 Un plugin de WordPress y varios temas de WordPress desarrollados por AccessPress Themes son vulnerables a la carga de archivos maliciosos a través de la acción plugin_offline_installer AJAX debido a la falta de una comprobación de capacidad en la función plugin_offline_installer_callback que se encuentra en el archivo /demo-functions.php o /welcome.php de los productos afectados. La lista completa de los productos afectados y sus versiones se encuentra a continuación: Plugin de WordPress: AccessPress Demo Importer versiones anteriores o iguales a 1.0.6 WordPress Themes: accesspress-basic versiones anteriores o iguales a 3.2.1 accesspress-lite versiones anteriores o iguales a 2.92 accesspress-mag versiones anteriores o iguales a 2.6.5 accesspress-parallax versiones anteriores o iguales a 4.5 accesspress-root versiones anteriores o iguales a 2.5 accesspress-store versiones anteriores o iguales a 2.4.9 agency-lite versiones anteriores o iguales a 1.1. 6 arrival versiones anteriores o iguales a 1.4.2 bingle versiones anteriores o iguales a 1.0.4 bloger versiones anteriores o iguales a 1.2.6 brovy versiones anteriores o iguales a 1.3 construction-lite versiones anteriores o iguales a 1.2.5 doko versiones anteriores o iguales a 1.0.27 edict-lite versiones anteriores o iguales a 1.1.4 eightlaw-lite versiones anteriores o iguales a 2.1.5 eightmedi-lite versiones anteriores o iguales a 2.1.8 eight-sec versiones anteriores o iguales a 1.1.4 eightstore-lite versiones anteriores o iguales a 1.2.5 enlighten versiones anteriores o iguales a 1. 3.5 fotography versiones anteriores o iguales a 2.4.0 opstore versiones anteriores o iguales a 1.4.3 parallaxsome versiones anteriores o iguales a 1.3.6 punte versiones anteriores o iguales a 1.1.2 revolve versiones anteriores o iguales a 1.3.1 ripple versiones anteriores o iguales a 1.2.0 sakala versiones anteriores o iguales a 1.0.4 scrollme versiones anteriores o iguales a 2.1.0 storevilla versiones anteriores o iguales a 1.4.1 swing-lite versiones anteriores o iguales a 1.1.9 the100 versiones anteriores o iguales a 1.1.2 the-launcher versiones anteriores o iguales a 1.3. 2 the-monday versiones anteriores o iguales a 1.4.1 ultra-seven versiones anteriores o iguales a 1.2.8 uncode-lite versiones anteriores o iguales a 1.3.3 vmag versiones anteriores o iguales a 1.2.7 vmagazine-lite versiones anteriores o iguales a 1.3.5 vmagazine-news versiones anteriores o iguales a 1.0.5 wpparallax versiones anteriores o iguales a 2.0.6 wp-store versiones anteriores o iguales a 1.1.9 zigcy-baby versiones anteriores o iguales a 1.0.6 zigcy-cosmetics versiones anteriores o iguales a 1.0.5 zigcy-lite versiones anteriores o iguales a 2.0.9 A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to malicious file uploads via the plugin_offline_installer AJAX action due to a missing capability check in the plugin_offline_installer_callback function found in the /demo-functions.php file or /welcome.php file of the affected products. • https://patchstack.com/articles/authenticated-vulnerability-in-unpatched-wordpress-themes https://plugins.trac.wordpress.org/changeset/2592642/access-demo-importer/trunk/inc/demo-functions.php https://plugins.trac.wordpress.org/changeset/2602132/access-demo-importer/trunk/inc/demo-functions.php https://www.wordfence.com/blog/2021/10/high-severity-vulnerability-patched-in-access-demo-importer-plugin • CWE-285: Improper Authorization CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Unvalidated input in the AccessPress Social Icons plugin, versions before 1.8.1, did not sanitise its widget attribute, allowing accounts with post permission, such as author, to perform SQL injections. Una entrada no comprobada en el plugin AccessPress Social Icons, versiones anteriores a 1.8.1, no saneaba su atributo de widget, permitiendo que cuentas con permiso de publicación, tales como el autor, para llevar a cabo inyecciones SQL • https://wpscan.com/vulnerability/02c5e10c-1ac7-447e-8ae5-b6d251be750b • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •