CVE-2022-0779 – User Meta < 2.4.4 - Subscriber+ Local File Enumeration via Path Traversal
https://notcve.org/view.php?id=CVE-2022-0779
The User Meta WordPress plugin before 2.4.4 does not validate the filepath parameter of its um_show_uploaded_file AJAX action, which could allow low privileged users such as subscriber to enumerate the local files on the web server via path traversal payloads El plugin User Meta de WordPress versiones anteriores a 2.4.4, no comprueba el parámetro filepath de su acción AJAX um_show_uploaded_file, lo que podría permitir a usuarios con pocos privilegios, como el suscriptor, enumerar los archivos locales en el servidor web por medio de cargas útiles de salto de ruta WordPress User Meta Lite and Pro plugin versions 2.4.3 and below suffer from a path traversal vulnerability. • https://wpscan.com/vulnerability/9d4a3f09-b011-4d87-ab63-332e505cf1cd • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2022-0376 – User Meta < 2.4.3 - Admin+ Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2022-0376
The User Meta WordPress plugin before 2.4.3 does not sanitise and escape the Form Name, as well as Shared Field Labels before outputting them in the admin dashboard when editing a form, which could allow high privilege users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed El plugin User Meta de WordPress versiones anteriores a 2.4.3, no sanea ni escapa el nombre del formulario, así como las etiquetas de los campos compartidos antes de mostrarlos en el panel de administración cuando se edita un formulario, lo que podría permitir a usuarios con altos privilegios llevar a cabo ataques de tipo Cross-Site Scripting incluso cuando unfiltered_html no está permitido • https://wpscan.com/vulnerability/a3ca2ed4-11ea-4d78-aa4c-4ed58f258932 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-0701 – SEO 301 Meta <= 1.9.1 - Admin+ Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2022-0701
The SEO 301 Meta WordPress plugin through 1.9.1 does not escape its Request and Destination settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed El plugin SEO 301 Meta de WordPress versiones hasta 1.9.1, no escapa a su configuración de Petición y Destino, permitiendo a usuarios con altos privilegios, como el administrador, llevar a cabo ataques de tipo Cross-Site Scripting incluso cuando la capacidad unfiltered_html no está permitida The SEO 301 Meta WordPress plugin through 1.9.1 does not escape its Request and Destination settings, allowing high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. • https://wpscan.com/vulnerability/68882f81-12d3-4e98-82ff-6754ac4ccfa1 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-24859 – User Meta Shortcodes <= 0.5 - Contributor+ Unauthorized Arbitrary User Metadata Access
https://notcve.org/view.php?id=CVE-2021-24859
The User Meta Shortcodes WordPress plugin through 0.5 registers a shortcode that allows any user with a role as low as contributor to access other users metadata by specifying the user login as a parameter. This makes the WP instance vulnerable to data extrafiltration, including password hashes El plugin User Meta Shortcodes de WordPress versiones hasta 0.5, registra un shortcode que permite a cualquier usuario con un rol tan bajo como el de colaborador acceder a los metadatos de otros usuarios al especificar el nombre de usuario como parámetro. Esto hace que la instancia de WP sea vulnerable a una extra filtración de datos, incluyendo los hashes de las contraseñas • https://wpscan.com/vulnerability/958f44a5-07e7-4349-9212-2a039a082ba0 • CWE-284: Improper Access Control •
CVE-2021-24611 – Keywords & Meta <= 3.0 - CSRF to Stored Cross-Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2021-24611
The Keyword Meta WordPress plugin through 3.0 does not sanitise of escape its settings before outputting them back in the page after they are saved, allowing for Cross-Site Scripting issues. Furthermore, it is also lacking any CSRF check, allowing attacker to make a logged in high privilege user save arbitrary setting via a CSRF attack. El plugin Keyword Meta WordPress versiones hasta 3.0, no sanea ni escapa sus ajustes antes de devolverlos a la página después de ser guardados, permitiendo problemas de tipo Cross-Site Scripting. Además, también carece de cualquier comprobación de tipo CSRF, que permite a un atacante hacer que un usuario con privilegios elevados guarde una configuración arbitraria por medio de un ataque CSRF. • https://wpscan.com/vulnerability/b4a2e595-6971-4a2a-a346-ac4445a5e0cd • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-352: Cross-Site Request Forgery (CSRF) •