Page 3 of 16 results (0.001 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The User Registration, User Profile, Login & Membership – ProfilePress (Formerly WP User Avatar) WordPress plugin before 3.1.11's widget for tabbed login/register was not properly escaped and could be used in an XSS attack which could lead to wp-admin access. Further, the plugin in several places assigned $_POST as $_GET which meant that in some cases this could be replicated with just $_GET parameters and no need for $_POST values. El plugin de Wordpress User Registration, User Profile, Login & Membership – ProfilePress (anteriormente WP User Avatar) versiones anteriores a 3.1.11, el widget para el inicio de sesión/registro con pestañas no se escapaba correctamente y podía usarse en un ataque de tipo XSS que podía conllevar a un acceso a wp-admin. Además, el plugin en varios lugares asignaba $_POST como $_GET lo que significaba que en algunos casos esto podría ser replicado con solo parámetros $_GET y sin necesidad de valores $_POST The User Registration, User Profile, Login & Membership – ProfilePress (Formerly WP User Avatar) WordPress plugin before 3.1.11's widget for tabbed login/register was not properly escaped and could be used in an XSS attack which could lead to wp-admin access. Further, the plugin in several places assigned $_POST as $_GET which meant that in some cases this could be replicated with just $_GET parameters and no need for $_POST values. • https://wpscan.com/vulnerability/25b51add-197c-4aff-b1a8-b92fb11d8697 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability in the user profile update component found in the ~/src/Classes/EditUserProfile.php file of the ProfilePress WordPress plugin made it possible for users to escalate their privileges to that of an administrator while editing their profile. This issue affects versions 3.0.0 - 3.1.3. . Una vulnerabilidad en el componente de actualización del perfil de usuario encontrada en el archivo ~/src/Classes/EditUserProfile.php del plugin ProfilePress de WordPress permite a usuarios escalar sus privilegios a los de un administrador durante la edición de su perfil. Este problema afecta a las versiones 3.0.0 - 3.1.3 • https://www.wordfence.com/blog/2021/06/easily-exploitable-critical-vulnerabilities-patched-in-profilepress-plugin • CWE-269: Improper Privilege Management •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability in the file uploader component found in the ~/src/Classes/FileUploader.php file of the ProfilePress WordPress plugin made it possible for users to upload arbitrary files during user registration or during profile updates. This issue affects versions 3.0.0 - 3.1.3. . Una vulnerabilidad en el componente de carga de archivos encontrada en el archivo ~/src/Classes/FileUploader.php del plugin ProfilePress de WordPress permite a usuarios cargar archivos arbitrarios durante el registro del usuario o durante la actualización del perfil. Este problema afecta a las versiones 3.0.0 - 3.1.3 A vulnerability in the file uploader component found in the ~/src/Classes/FileUploader.php file of the ProfilePress WordPress plugin made it possible for users to upload arbitrary files during user registration or during profile updates. This issue affects versions 3.0.0 - 3.1.3. • https://www.wordfence.com/blog/2021/06/easily-exploitable-critical-vulnerabilities-patched-in-profilepress-plugin • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The User Registration, User Profiles, Login & Membership – ProfilePress (Formerly WP User Avatar) WordPress plugin before 3.1.8 did not sanitise or escape some of its settings before saving them and outputting them back in the page, allowing high privilege users such as admin to set JavaScript payloads in them even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue El plugin de WordPress User Registration, User Profiles, Login & Membership – ProfilePress (Anteriormente WP User Avatar) versiones anteriores a 3.1.8, no saneaba o escapaba de algunas de sus configuraciones antes de guardarlas y devolverlas a la página, permitiendo a usuarios con altos privilegios, como el administrador, establecer cargas útiles de JavaScript en ellas incluso cuando la capacidad unfiltered_html está deshabilitada, conllevando a un problema de tipo Cross-Site Scripting Almacenado autenticado • https://wpscan.com/vulnerability/a8625579-fe8f-4bc1-a641-0e26ad141c92 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A vulnerability in the image uploader component found in the ~/src/Classes/ImageUploader.php file of the ProfilePress WordPress plugin made it possible for users to upload arbitrary files during user registration or during profile updates. This issue affects versions 3.0.0 - 3.1.3. . Una vulnerabilidad en el componente de carga de imágenes encontrada en el archivo ~/src/Classes/ImageUploader.php del plugin ProfilePress de WordPress hace posible para usuarios cargar archivos arbitrarios durante el registro de usuarios o durante las actualizaciones del perfil. Este problema afecta a las versiones 3.0.0 - 3.1.3 • https://www.wordfence.com/blog/2021/06/easily-exploitable-critical-vulnerabilities-patched-in-profilepress-plugin • CWE-434: Unrestricted Upload of File with Dangerous Type •