CVE-2024-2744 – Nextgen Gallery < 3.59.1 - Admin+ Stored XSS
https://notcve.org/view.php?id=CVE-2024-2744
The NextGEN Gallery WordPress plugin before 3.59.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed El complemento de WordPress NextGEN Gallery anterior a 3.59.1 no sanitiza ni escapa a algunas de sus configuraciones, lo que podría permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross Site Scripting incluso cuando unfiltered_html no está permitido. The NextGEN Gallery – Create an Amazing Photo Gallery in Seconds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.59 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. • https://wpscan.com/vulnerability/a5579c15-50ba-4618-95e4-04b2033d721f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-2429 – Salon booking system <= 9.6.5 - Settings Update via CSRF
https://notcve.org/view.php?id=CVE-2024-2429
The Salon booking system WordPress plugin through 9.6.5 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack El complemento Salon booking system de WordPress hasta la versión 9.6.5 no tiene activada la verificación CSRF al actualizar su configuración, lo que podría permitir a los atacantes hacer que un administrador que haya iniciado sesión los cambie mediante un ataque CSRF. The Salon booking system plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 9.6.5. This is due to missing or incorrect nonce validation on the salon-settings page. This makes it possible for unauthenticated attackers to modify the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/1c6812d8-a218-4c15-9e2d-d43f3f3b0e78 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2024-3580 – Popup4Phone <= 1.3.2 - Editor+ Stored XSS
https://notcve.org/view.php?id=CVE-2024-3580
The Popup4Phone WordPress plugin through 1.3.2 does not sanitise and escape some of its settings, which could allow high privilege users such as Editor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) El complemento de WordPress Popup4Phone hasta la versión 1.3.2 no sanitiza ni escapa a algunas de sus configuraciones, lo que podría permitir a usuarios con privilegios elevados, como Editor, realizar ataques de Cross-Site Scripting almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración multisitio). The Popup4Phone plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. • https://wpscan.com/vulnerability/31f401c4-735a-4efb-b81f-ab98c00c526b • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-3642 – Newsletter Popup <= 1.2 - Subscriber Deletion via CSRF
https://notcve.org/view.php?id=CVE-2024-3642
The Newsletter Popup WordPress plugin through 1.2 does not have CSRF check when deleting subscriber, which could allow attackers to make logged in admins perform such action via a CSRF attack The Newsletter Popup plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the wp_newsletter_show_localrecord page. This makes it possible for unauthenticated attackers to delete subscribers via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/dc44d85f-afe8-4824-95b0-11b9abfb04d8 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2024-3643 – Newsletter Popup <= 1.2 - List Deletion via CSRF
https://notcve.org/view.php?id=CVE-2024-3643
The Newsletter Popup WordPress plugin through 1.2 does not have CSRF check when deleting list, which could allow attackers to make logged in admins perform such action via a CSRF attack The Newsletter Popup plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the wp_newsletter_show_items page. This makes it possible for unauthenticated attackers to delete lists via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/698277e6-56f9-4688-9a84-c2fa3ea9f7dc • CWE-352: Cross-Site Request Forgery (CSRF) •