CVE-2024-30440 – WordPress Themify Event Post plugin <= 1.2.7 - Cross Site Scripting (XSS) vulnerability
https://notcve.org/view.php?id=CVE-2024-30440
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themify Themify Event Post allows Stored XSS.This issue affects Themify Event Post: from n/a through 1.2.7. Neutralización inadecuada de la entrada durante la vulnerabilidad de generación de páginas web ('Cross-site Scripting') en Themify Themify Event Post permite XSS almacenado. Este problema afecta a Themify Event Post: desde n/a hasta 1.2.7. The Themify Event Post plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://patchstack.com/database/vulnerability/themify-event-post/wordpress-themify-event-post-plugin-1-2-7-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-29776 – WordPress EventPrime plugin <= 3.3.9 - Cross Site Scripting (XSS) vulnerability
https://notcve.org/view.php?id=CVE-2024-29776
Cross Site Scripting (XSS) vulnerability in Metagauss EventPrime.This issue affects EventPrime: from n/a through 3.3.9. Vulnerabilidad de cross-site scripting (XSS) en Metagauss EventPrime. Este problema afecta a EventPrime: desde n/a hasta 3.3.9. The EventPrime plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.3.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://patchstack.com/database/vulnerability/eventprime-event-calendar-management/wordpress-eventprime-plugin-3-3-9-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-25634 – IDOR make user can read e-mail log sent by other events
https://notcve.org/view.php?id=CVE-2024-25634
alf.io is an open source ticket reservation system. Prior to version 2.0-Mr-2402, an attacker can access data from other organizers. The attacker can use a specially crafted request to receive the e-mail log sent by other events. Version 2.0-M4-2402 fixes this issue. alf.io es un sistema de reserva de entradas de código abierto. Antes de la versión 2.0-Mr-2402, un atacante podía acceder a datos de otros organizadores. • https://github.com/alfio-event/alf.io/security/advisories/GHSA-5wcv-pjc6-mxvv • CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere •
CVE-2024-25635 – IDOR Vulnerability: Allowing Organization Owner to view the other Organizations API KEY and USERS
https://notcve.org/view.php?id=CVE-2024-25635
alf.io is an open source ticket reservation system. Prior to version 2.0-Mr-2402, organization owners can view the generated API KEY and USERS of other organization owners using the `http://192.168.26.128:8080/admin/api/users/<user_id>` endpoint, which exposes the details of the provided user ID. This may also expose the API KEY in the username of the user. Version 2.0-M4-2402 fixes this issue. alf.io es un sistema de reserva de entradas de código abierto. Antes de la versión 2.0-Mr-2402, los propietarios de organizaciones pueden ver la CLAVE API generada y los USUARIOS de otros propietarios de organizaciones utilizando el endpoint `http://192.168.26.128:8080/admin/api/users/`, que expone los detalles del ID de usuario proporcionado. • https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f • CWE-612: Improper Authorization of Index Containing Sensitive Information •
CVE-2024-25627 – Cross-Site Scripting (XSS) via File Upload in Alf.io
https://notcve.org/view.php?id=CVE-2024-25627
Alf.io is a free and open source event attendance management system. An administrator on the alf.io application is able to upload HTML files that trigger JavaScript payloads. As such, an attacker gaining administrative access to the alf.io application may be able to persist access by planting an XSS payload. This issue has been addressed in version 2.0-M4-2402. Users are advised to upgrade. • https://github.com/alfio-event/alf.io/security/advisories/GHSA-gpmg-8f92-37cf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-434: Unrestricted Upload of File with Dangerous Type •