Page 4 of 18 results (0.002 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

The woocommerce-product-addon plugin before 18.4 for WordPress has XSS via an import of a new meta data structure. El plugin woocommerce-product-addon anterior a la versión 18.4 para WordPress tiene XSS a través de la importación de una nueva estructura de metadatos. • https://wordpress.org/plugins/woocommerce-product-addon/#developers https://wpvulndb.com/vulnerabilities/9502 https://www.pluginvulnerabilities.com/2019/08/08/this-authenticated-persistent-xss-vulnerability-might-be-what-hackers-are-targeting-ppom-for-woocommerce-for • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-site request forgery (CSRF) vulnerability in Personalized WooCommerce Cart Page 2.4 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. Una vulnerabilidad de tipo cross-site request forgery (CSRF) en Personalized WooCommerce Cart Page versión 2.4 y anteriores, permite a los atacantes remotos secuestrar la autenticación de administradores por medio de vectores no especificados. • https://jvn.jp/en/jp/JVN88804335/index.html https://wordpress.org/plugins/personalize-woocommerce-cart-page https://wpvulndb.com/vulnerabilities/9437 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 4EXPL: 0

Unrestricted file upload vulnerability in the N-Media file uploader plugin before 3.4 for WordPress allows remote authenticated users to execute arbitrary PHP code by leveraging Author privileges to store a file. Vulnerabilidad de la subida de ficheros sin restricciones en el plugin N-Media file uploader anterior a 3.4 para WordPress permite a usuarios remotos autenticados ejecutar código PHP arbitrario mediante el aprovechamiento de los privilegios de autor para almacenar un fichero. The Frontend File Manager plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the _template_uploader.php file in versions up to, and including, 3.5. This makes it possible for authenticated attackers, with author-level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible. • http://jvn.jp/en/jp/JVN87863382/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2014-000112 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-434: Unrestricted Upload of File with Dangerous Type •