Page 6 of 130 results (0.006 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

The WpStickyBar WordPress plugin through 2.1.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection The WpStickyBar – Sticky Bar, Sticky Header plugin for WordPress is vulnerable to SQL Injection via the 'banner_id' parameter of the 'stickybar_display' AJAX action in all versions up to, and including, 2.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. • https://wpscan.com/vulnerability/0b73f84c-611e-4681-b362-35e721478ba4 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

The CZ Loan Management WordPress plugin through 1.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection The CZ Loan Management plugin for WordPress is vulnerable to SQL Injection via the 'selectedperiod' parameter of the 'cz_plugin_for_user_get_percentage' AJAX action in all versions up to, and including, 1.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. • https://wpscan.com/vulnerability/68f81943-b007-49c8-be9c-d0405b2ba4cf • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 2

The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability. El complemento PayPlus Payment Gateway de WordPress anterior a 6.6.9 no sanitiza ni escapa adecuadamente un parámetro antes de usarlo en una declaración SQL a través de una ruta API de WooCommerce disponible para usuarios no autenticados, lo que genera una vulnerabilidad de inyección SQL. The PayPlus Payment Gateway plugin for WordPress is vulnerable SQL Injection in all versions up to, and including, 6.6.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. ... WordPress PayPlus Payment Gateway plugin versions prior to 6.6.9 suffer from a remote SQL injection vulnerability. • https://github.com/j3r1ch0123/CVE-2024-6205 https://wpscan.com/vulnerability/7e2c5032-2917-418c-aee3-092bdb78a087 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. ... Several plugins for WordPress hosted on WordPress.org have been compromised and injected with malicious PHP scripts. • sfp_email=&sfph_mail=&reponame=&old=3106042%40social-warfare&new=3106042%40social-warfare&sfp_email=&sfph_mail= https://wordpress.org/support/topic/a-security-message-from-the-plugin-review-team https://www.wordfence.com/threat-intel/vulnerabilities/id/56d24bc8-4a1a-4e60-aec5-960703a6058a? • CWE-506: Embedded Malicious Code •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 0.1.0.38. • https://patchstack.com/database/vulnerability/instawp-connect/wordpress-instawp-connect-plugin-0-1-0-38-arbitrary-file-upload-vulnerability? • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-434: Unrestricted Upload of File with Dangerous Type •