CVE-2018-18576
https://notcve.org/view.php?id=CVE-2018-18576
The Hustle (aka wordpress-popup) plugin through 6.0.5 for WordPress allows Directory Traversal to obtain a directory listing via the views/admin/dashboard/ URI. El plugin Hustle (también se conoce como wordpress-popup) versiones hasta 6.0.5 para WordPress, permite a Salto de Directorio para obtener una lista de directorios por medio del URI views/admin/dashboard/. • https://pastebin.com/ndDJT3d3 https://wordpress.org/plugins/wordpress-popup/#developers • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2019-11872 – Hustle <= 6.0.7 - Unauthenticated CSV Injection
https://notcve.org/view.php?id=CVE-2019-11872
The Hustle (aka wordpress-popup) plugin 6.0.7 for WordPress is vulnerable to CSV Injection as it allows for injecting malicious code into a pop-up window. Successful exploitation grants an attacker with a right to execute malicious code on the administrator's computer through Excel functions as the plugin does not sanitize the user's input and allows insertion of any text. El complemento de Hustle (conocido como wordpress-popup) versión 6.0.7 para WordPress es vulnerable a la inyección de CSV, ya que permite inyectar códigos maliciosos en una ventana emergente. La explotación exitosa concede a un atacante el derecho de ejecutar códigos maliciosos en la computadora del administrador mediante funciones de Excel, ya que el complemento no realiza el saneamiento de la entrada del usuario y permite la inserción de cualquier texto. • https://blog.reddy.io/2019/05/24/reddy-solutions-found-a-csv-injection-vulnerability-in-hustle-wordpress-plugin https://blog.reddy.io/category/cybersecurity https://wordpress.org/plugins/wordpress-popup/#developers https://wpvulndb.com/vulnerabilities/9326 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-1236: Improper Neutralization of Formula Elements in a CSV File •
CVE-2019-9567 – Forminator Plugin <= 1.5.4 - Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2019-9567
The "Forminator Contact Form, Poll & Quiz Builder" plugin before 1.6 for WordPress has XSS via a custom input field of a poll. El plugin "Forminator Contact Form, Poll Quiz Builder", en versiones anteriores a la 1.6 para WordPress, tiene Cross-Site Scripting (XSS) mediante un campo de entradas personalizado de una encuesta. WordPress Forminator plugin version 1.5.4 suffers from cross site scripting and remote SQL injection vulnerabilities. • https://lists.openwall.net/full-disclosure/2019/02/05/4 https://security-consulting.icu/blog/2019/02/wordpress-forminator-persistent-xss-blind-sql-injection https://wordpress.org/plugins/forminator/#developers https://wpvulndb.com/vulnerabilities/9215 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2019-9568 – Forminator Plugin <= 1.5.3.1 - SQL Injection
https://notcve.org/view.php?id=CVE-2019-9568
The "Forminator Contact Form, Poll & Quiz Builder" plugin before 1.6 for WordPress has SQL Injection via the wp-admin/admin.php?page=forminator-entries entry[] parameter if the attacker has the delete permission. El plugin "Forminator Contact Form, Poll Quiz Builder", en versiones anteriores a la 1.6 para WordPress, tiene una inyección SQL mediante en parámetro entry[] "wp-admin/admin.php?page=forminator-entries" si el atacante tiene permisos de borrado. WordPress Forminator plugin version 1.5.4 suffers from cross site scripting and remote SQL injection vulnerabilities. • https://lists.openwall.net/full-disclosure/2019/02/05/4 https://security-consulting.icu/blog/2019/02/wordpress-forminator-persistent-xss-blind-sql-injection https://wordpress.org/plugins/forminator/#developers https://wpvulndb.com/vulnerabilities/9215 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2015-9455 – BuddyPress Activity Plus <= 1.5 - Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2015-9455
The buddypress-activity-plus plugin before 1.6.2 for WordPress has CSRF with resultant directory traversal via the wp-admin/admin-ajax.php bpfb_photos[] parameter in a bpfb_remove_temp_images action. El plugin buddypress-activity-plus versiones anteriores a 1.6.2 para WordPress, presenta una vulnerabilidad de tipo CSRF con un salto de directorio resultante por medio del parámetro bpfb_photos[] del archivo wp-admin/admin-ajax.php en una acción bpfb_remove_temp_images. • https://security.dxw.com/advisories/csrf-and-arbitrary-file-deletion-in-buddypress-activity-plus-1-5 https://wordpress.org/plugins/buddypress-activity-plus/#developers • CWE-352: Cross-Site Request Forgery (CSRF) •