CVE-2024-5281 – WP Affiliate Platform < 6.5.1 - Reflected XSS via Affiliate Editing
https://notcve.org/view.php?id=CVE-2024-5281
The wp-affiliate-platform WordPress plugin before 6.5.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin El complemento wp-affiliate-platform de WordPress anterior a 6.5.1 no sanitiza ni escapa un parámetro antes de devolverlo a la página, lo que genera Cross-Site Scripting Reflejado que podría usarse contra usuarios con altos privilegios, como el administrador. The WP Affiliate Platform plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'editaff' parameter in all versions up to 6.5.1 (exclusive) due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/3c0bdb0f-a06a-47a8-9198-a2bf2678b8f1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-5079 – WP eMember < 10.6.7 - Unauthenticated Stored XSS via Member Registration
https://notcve.org/view.php?id=CVE-2024-5079
The wp-eMember WordPress plugin before 10.6.7 does not sanitise and escape some of the fields when members register, which allows unauthenticated users to perform Stored Cross-Site Scripting attacks El complemento wp-eMember de WordPress anterior a 10.6.7 no sanitiza ni escapa de algunos de los campos cuando los miembros se registran, lo que permite a usuarios no autenticados realizar ataques de Cross-Site Scripting Almacenado. The Wp EMember plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name fields in all versions up to, and including, 10.6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/bdb5509e-80ab-4e47-83a4-9347796eec40 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-5167 – CM Email Registration Blacklist and Whitelist < 1.4.9 - Add/Delete Emails via CSRF Add and delete any item from blacklist/whitelist
https://notcve.org/view.php?id=CVE-2024-5167
The CM Email Registration Blacklist and Whitelist WordPress plugin before 1.4.9 does not have CSRF check when adding or deleting an item from the blacklist or whitelist, which could allow attackers to make a logged in admin add or delete settings from the blacklist or whitelist menu via a CSRF attack El complemento CM Email Registration Blacklist y Whitelist de WordPress anterior a 1.4.9 no tiene verificación CSRF al agregar o eliminar un elemento de la lista negra o blanca, lo que podría permitir a los atacantes hacer que un administrador que haya iniciado sesión agregue o elimine configuraciones de la lista negra o del menú de la lista blanca a través de un ataque CSRF The CM Email Registration Blacklist and Whitelist plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.8. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to add and delete emails and modify the blacklist/whitelist via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/67bb5ab8-4493-4f5b-a989-41576675b61a • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2024-2696 – Swift Framework < 2024.04.30 - Admin+ Stored XSS via Settings
https://notcve.org/view.php?id=CVE-2024-2696
The socialdriver-framework WordPress plugin before 2024.04.30 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) El complemento socialdriver-framework para WordPress anterior al 30/04/2024 no sanitiza ni escapa a algunas de sus configuraciones, lo que podría permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross Site Scripting almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en la configuración de múltiples sitios). The Swift Framework plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Instagram and Google Auth fields in all versions up to 2024.04.30 (exclusive) due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. • https://wpscan.com/vulnerability/b6e64af0-adeb-4e28-9a81-f4024b0446ee • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-6024 – ContentLock <= 1.0.3 - Groups/Emails Deletion via CSRF
https://notcve.org/view.php?id=CVE-2024-6024
The ContentLock WordPress plugin through 1.0.3 does not have CSRF check in place when deleting groups or emails, which could allow attackers to make a logged in admin remove them via a CSRF attack El complemento ContentLock para WordPress hasta la versión 1.0.3 no tiene activada la verificación CSRF al eliminar grupos o correos electrónicos, lo que podría permitir a los atacantes hacer que un administrador que haya iniciado sesión los elimine mediante un ataque CSRF. The ContentLock plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to delete groups and emails via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/3d2cdb4f-b7e1-4691-90d1-cddde7f5858e • CWE-352: Cross-Site Request Forgery (CSRF) •