Page 4 of 38 results (0.011 seconds)

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The Print-O-Matic WordPress plugin before 2.1.8 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. El complemento Print-O-Matic de WordPress anterior a 2.1.8 no valida ni escapa algunos de sus atributos de código corto antes de devolverlos a la página, lo que podría permitir a los usuarios con un rol tan bajo como el de colaborador realizar ataques de cross-site scripting almacenado que podría usarse contra usuarios con altos privilegios, como administradores. The Print-O-Matic plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in versions up to, and including, 2.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page • https://wpscan.com/vulnerability/5d72ec1f-5379-4d8e-850c-afe8b41bb126 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The Quote-O-Matic WordPress plugin through 1.0.5 does not properly sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. The Quote-O-Matic plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.0.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. • https://wpscan.com/vulnerability/aa07ddac-4f3d-4c4c-ba26-19bc05f22f02 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 1

The Print-O-Matic WordPress plugin before 2.0.3 does not escape some of its settings before outputting them in attribute, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. El plugin Print-O-Matic de WordPress versiones anteriores a 2.0.3, no escapa a algunas de sus configuraciones antes de imprimirlas en el atributo, lo que podría permitir a usuarios muy privilegiados llevar a cabo ataques de tipo Cross-Site Scripting incluso cuando la capacidad unfiltered_html está deshabilitada • https://plugins.trac.wordpress.org/changeset/2610060 https://wpscan.com/vulnerability/84e83d52-f69a-4de2-80c8-7c1996b30a04 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The Verse-O-Matic WordPress plugin through 4.1.1 does not have any CSRF checks in place, allowing attackers to make logged in administrators do unwanted actions, such as add/edit/delete arbitrary verses and change the settings. Due to the lack of sanitisation in the settings and verses, this could also lead to Stored Cross-Site Scripting issues El plugin de WordPress Verse-O-Matic versiones hasta 4.1.1, no presenta ninguna comprobación de tipo CSRF, permitiendo a atacantes hacer a unos administradores registrados realizar acciones no deseadas, como añadir/editar/borrar versos arbitrarios y cambiar la configuración. Debido a una falta de saneamiento en las configuraciones y versos, esto también podría conllevar a problemas de tipo Cross-Site Scripting Almacenado. • https://wpscan.com/vulnerability/37c7bdbb-f27f-47d3-9886-69d2e83d7581 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 1

Collabtive 3.1 allows XSS when an authenticated user enters an XSS payload into the address section of the profile edit page, aka the manageuser.php?action=edit address1 parameter. Collabtive versión 3.1, permite un ataque de tipo XSS cuando un usuario autenticado ingresa una carga útil de tipo XSS en la sección de dirección de la página de edición de perfil, también se conoce como el parámetro address1 de manageuser.php?action=edit • https://www.exploit-db.com/exploits/49468 https://collabtive.o-dyn.de/forum/viewforum.php?f=6 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •