Page 6 of 32 results (0.004 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The Coming soon and Maintenance mode WordPress plugin before 3.6.8 does not have CSRF check in its coming_soon_send_mail AJAX action, allowing attackers to make logged in admin to send arbitrary emails to all subscribed users via a CSRF attack El plugin Coming soon y Maintenance mode de WordPress versiones anteriores a 3.6.8, no presenta comprobación CSRF en su acción coming_soon_send_mail AJAX, permitiendo a atacantes hacer que el administrador conectado envíe correos electrónicos arbitrarios a todos los usuarios suscritos por medio de un ataque de tipo CSRF • https://plugins.trac.wordpress.org/changeset/2659455 https://wpscan.com/vulnerability/1ab1748f-c939-4953-83fc-9df878da7714 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The Countdown and CountUp, WooCommerce Sales Timers WordPress plugin is vulnerable to Cross-Site Request Forgery via the save_theme function found in the ~/includes/admin/coundown_theme_page.php file due to a missing nonce check which allows attackers to inject arbitrary web scripts, in versions up to and including 1.5.7. El plugin Countdown and CountUp, WooCommerce Sales Timers de WordPress es vulnerable a un ataque de tipo Cross-Site Request Forgery por medio de la función save_theme que se encuentra en el archivo ~/includes/admin/coundown_theme_page.php debido a una comprobación nonce faltante que permite a atacantes inyectar scripts web arbitrarios, en versiones hasta la 1.5.7 incluyéndola • https://plugins.trac.wordpress.org/changeset/2605523/countdown-wpdevart-extended/trunk/includes/admin/coundown_theme_page.php https://www.wordfence.com/vulnerability-advisories/#CVE-2021-34636 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The Coming soon and Maintenance mode WordPress plugin before 3.5.3 does not properly sanitize inputs submitted by authenticated users when setting adding or modifying coming soon or maintenance mode pages, leading to stored XSS. El plugin Coming soon y Maintenance mode de WordPress versiones anteriores a 3.5.3, no sanea correctamente las entradas enviadas por los usuarios autenticados cuando se configuran añadiendo o modificando las páginas coming soon o maintenance mode, conllevando a un ataque de tipo XSS almacenado • https://wpscan.com/vulnerability/d453b547-41a8-4a6b-8349-8686b7054805 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 1

The YouTube Embed, Playlist and Popup by WpDevArt WordPress plugin before 2.3.9 did not escape, validate or sanitise some of its shortcode options, available to users with a role as low as Contributor, leading to an authenticated Stored Cross-Site Scripting issue. El plugin de WordPress YouTube Embed, Playlist and Popup by WpDevArt versiones anteriores a 2.3.9, no escapaba, comprobaba o saneaba algunas de sus opciones de shortcode, disponibles para usuarios con un rol tan bajo como el de Contributor, conllevando a un problema de tipo Cross-Site Scripting Almacenado autenticado • https://wpscan.com/vulnerability/531b3fac-48b9-4821-a3aa-4db073d43aae • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 13%CPEs: 1EXPL: 2

The Poll, Survey, Questionnaire and Voting system WordPress plugin before 1.5.3 did not sanitise, escape or validate the date_answers[] POST parameter before using it in a SQL statement when sending a Poll result, allowing unauthenticated users to perform SQL Injection attacks El plugin Poll, Survey, Questionnaire and Voting system de WordPress, versiones anteriores a 1.5.3 no saneaba, escapaba o comprobaba el parámetro POST date_answers[] antes de usarlo en una sentencia SQL cuando se envía el resultado de una encuesta, permitiendo a usuarios no autenticados llevar a cabo ataques de inyección SQL • https://wpscan.com/vulnerability/7376666e-9b2a-4239-b11f-8544435b444a https://www.in-spired.xyz/wpdevart-polls-blind-sql-injection • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •