Page 3 of 16 results (0.001 seconds)

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Unauthenticated Stored Cross-Site Scripting (XSS) in Simple Ajax Chat <= 20220115 allows an attacker to store the malicious code. However, the attack requires specific conditions, making it hard to exploit. Una vulnerabilidad de tipo Cross-Site Scripting (XSS) Almacenado no Autenticado en Simple Ajax Chat versiones anteriores a 20220115 incluyéndola, permite a un atacante almacenar el código malicioso. Sin embargo, el ataque requiere condiciones específicas, por lo que es difícil de explotar The Simple Ajax Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 20220115 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://patchstack.com/database/vulnerability/simple-ajax-chat/wordpress-simple-ajax-chat-plugin-20220115-unauthenticated-stored-cross-site-scripting-xss-vulnerability https://wordpress.org/plugins/simple-ajax-chat/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 1

The Blackhole for Bad Bots WordPress plugin before 3.3.2 uses headers such as CF-CONNECTING-IP, CLIENT-IP etc to determine the IP address of requests hitting the blackhole URL, which allows them to be spoofed. This could result in blocking arbitrary IP addresses, such as legitimate/good search engine crawlers / bots. This could also be abused by competitors to cause damage related to visibility in search engines, can be used to bypass arbitrary blocks caused by this plugin, block any visitor or even the administrator and even more. El plugin Blackhole for Bad Bots de WordPress versiones anteriores a 3.3.2, usa encabezados como CF-CONNECTING-IP, CLIENT-IP, etc. para determinar la dirección IP de las peticiones que llegan a la URL del blackhole, lo que permite que sean suplantadas. Esto podría resultar en el bloqueo de direcciones IP arbitrarias, tales como rastreadores / bots de motores de búsqueda legítimos / buenos. • https://plugins.trac.wordpress.org/changeset/2666486 https://wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710 • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Prismatic WordPress plugin before 2.8 does not escape the 'tab' GET parameter before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator El plugin Prismatic WordPress anterior a versión 2.8, no escapa el parámetro "tab" GET antes de devolverlo en un atributo, conllevando a un problema de tipo Cross-Site Scripting reflejado que será ejecutado en el contexto de un administrador conectado • https://wpscan.com/vulnerability/ae3cd3ed-aecd-4d8c-8a2b-2936aaaef0cf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The Prismatic WordPress plugin before 2.8 does not sanitise or validate some of its shortcode parameters, allowing users with a role as low as Contributor to set Cross-Site payload in them. A post made by a contributor would still have to be approved by an admin to have the XSS trigger able in the frontend, however, higher privilege users, such as editor could exploit this without the need of approval, and even when the blog disallows the unfiltered_html capability. El plugin Prismatic de WordPress versiones anteriores a 2.8, no sanea o comprueba algunos de sus parámetros shortcode, permitiendo a usuarios con un rol tan bajo como el de colaborador ajustar carga útil de tipo Cross-Site en ellos. Un post hecho por un colaborador todavía tendría que ser aprobado por un administrador para que el ataque XSS se desencadene en el frontend, sin embargo, los usuarios con mayores privilegios, como el editor podrían explotar esto sin necesidad de aprobación, e incluso cuando el blog deshabilita la capacidad unfiltered_html • https://wpscan.com/vulnerability/51855853-e7bd-425f-802c-824209f4f84d • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1

The User Submitted Posts plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the usp_check_images function in versions up to, and including, 20190312. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible. • https://blog.nintechnet.com/arbitrary-file-upload-vulnerability-in-wordpress-user-submitted-posts-plugin https://wordpress.org/plugins/user-submitted-posts/#developers https://www.wordfence.com/threat-intel/vulnerabilities/id/5a97877b-fb4d-4e87-bcff-56be65fee6ce?source=cve • CWE-434: Unrestricted Upload of File with Dangerous Type •