CVE-2023-1023 – WP Meta SEO <= 4.5.3 - Missing Authorization in 'saveSitemapSettings'
https://notcve.org/view.php?id=CVE-2023-1023
The WP Meta SEO plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the saveSitemapSettings function in versions up to, and including, 4.5.3. This makes it possible for authenticated attackers with subscriber-level access to change sitemap-related settings of the plugin. This vulnerability occurred as a result of the plugin relying on nonce checks as a means of access control, and that nonce being accessible to all authenticated users regardless of role. • https://plugins.trac.wordpress.org/changeset/2870465/wp-meta-seo/trunk?contextall=1&old=2869205&old_path=%2Fwp-meta-seo%2Ftrunk#file2 https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2870465%40wp-meta-seo&new=2870465%40wp-meta-seo&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/9d1e498a-ddcb-4c67-bf0d-bb45b6fe0e9d • CWE-862: Missing Authorization •
CVE-2023-0875 – WP Meta SEO < 4.5.3 - Subscriber+ SQLi
https://notcve.org/view.php?id=CVE-2023-0875
The WP Meta SEO WordPress plugin before 4.5.3 does not properly sanitize and escape inputs into SQL queries, leading to a blind SQL Injection vulnerability that can be exploited by subscriber+ users. The WP Meta SEO plugin for WordPress is vulnerable to SQL Injection via the ‘ids’ parameter in the bulkImageCopy function reachable via the wp_ajax_wpms AJAX action in versions up to, and including, 4.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Since the plugin relied on nonce checks as a means of access control, and that nonce was made accessible to all authenticated users regardless of role, the vulnerability could be exploited by asubscribers. • https://wpscan.com/vulnerability/d44e9a45-cbdf-46b1-8b48-7d934b617534 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2022-30337 – WordPress WP Meta SEO plugin <= 4.4.8 - Social Settings Update vis Cross-Site Request Forgery (CSRF) vulnerability
https://notcve.org/view.php?id=CVE-2022-30337
Cross-Site Request Forgery (CSRF) vulnerability in JoomUnited WP Meta SEO plugin <= 4.4.8 at WordPress allows an attacker to update the social settings. Una vulnerabilidad de tipo Cross-Site Request Forgery (CSRF) en el plugin JoomUnited WP Meta SEO versiones anteriores a 4.4.8 incluyéndola en WordPress, permite a un atacante actualizar la configuración social The WP Meta SEO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.4.8. This is due to incorrect nonce validation which only verifies the presence of a nonce value rather than the on the validity of the nonce on a couple of cases in the loadPage() function. This makes it possible for unauthenticated attackers to modify the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://patchstack.com/database/vulnerability/wp-meta-seo/wordpress-wp-meta-seo-plugin-4-4-8-social-settings-update-vis-cross-site-request-forgery-csrf-vulnerability https://wordpress.org/plugins/wp-meta-seo/#developers • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2022-1093 – WP Meta SEO < 4.4.7 - Admin+ Stored Cross-Site Scripting via breadcrumbs
https://notcve.org/view.php?id=CVE-2022-1093
The WP Meta SEO WordPress plugin before 4.4.7 does not sanitise or escape the breadcrumb separator before outputting it to the page, allowing a high privilege user such as an administrator to inject arbitrary javascript into the page even when unfiltered html is disallowed. El plugin WP Meta SEO de WordPress versiones anteriores a 4.4.7, no sanea ni escapa del separador breadcrumb antes de enviarlo a la página, lo que permite a un usuario con altos privilegios, como un administrador, inyectar javascript arbitrario en la página incluso cuando el html sin filtrar no está permitido • https://wpscan.com/vulnerability/57017050-811e-474d-8256-33d19d4c0553 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •