Page 3 of 13 results (0.002 seconds)

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

The Weather Effect WordPress plugin before 1.3.6 does not properly validate and escape some of its settings (like *_size_leaf, *_flakes_leaf, *_speed) which could lead to Stored Cross-Site Scripting issues El plugin Weather Effect de WordPress versiones anteriores a 1.3.6, no comprueba ni escapa correctamente de algunas de sus configuraciones (como *_size_leaf, *_flakes_leaf, *_speed), lo que podría conllevar a problemas de tipo Cross-Site Scripting Almacenado • https://wpscan.com/vulnerability/df74ed76-af9e-47a8-9a4d-c5c57e9e0f91 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The Grid Gallery – Photo Image Grid Gallery WordPress plugin before 1.2.5 does not properly sanitize the title field for image galleries when adding them via the admin dashboard, resulting in an authenticated Stored Cross-Site Scripting vulnerability. El plugin de WordPress Grid Gallery - Photo Image Grid Gallery versiones anteriores a 1.2.5, no sanea apropiadamente el campo title de las galerías de imágenes cuando se añaden por medio de la consola de administración, resultando en una vulnerabilidad de tipo Cross-Site Scripting Almacenada y autenticada. • https://wpscan.com/vulnerability/8953d931-19f9-4b73-991c-9c48db1af8b5 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The new-contact-form-widget (aka Contact Form Widget - Contact Query, Form Maker) plugin 1.0.9 for WordPress has SQL Injection via all-query-page.php. El plugin new-contact-form-widget (también se conoce como Contact Form Widget - Contact Query, Form Maker) versión 1.0.9 para WordPress, presenta una inyección SQL por medio del archivo all-query-page.php. The Contact Form Widget – Contact Query, Contact Page, Form Maker, Query Table plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.3.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This is only exploitable when magic quotes are disabled. • https://gist.github.com/rezaduty/18afedba24bb1e5835010bd2de67cece https://wordpress.org/plugins/new-contact-form-widget/#description • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •