CVE-2021-36920 – WordPress plugin Download Monitor <= 4.4.6 - Authenticated Reflected Cross-Site Scripting (XSS) vulnerability
https://notcve.org/view.php?id=CVE-2021-36920
Authenticated Reflected Cross-Site Scripting (XSS) vulnerability discovered in WordPress plugin Download Monitor (versions <= 4.4.6). Se ha detectado una vulnerabilidad de tipo Cross-Site Scripting (XSS) reflejado y autenticado en el plugin Download Monitor de WordPress (versiones anteriores a 4.4.6 incluyéndola) • https://patchstack.com/database/vulnerability/download-monitor/wordpress-download-monitor-plugin-4-4-6-authenticated-reflected-cross-site-scripting-xss-vulnerability https://wordpress.org/plugins/download-monitor/#developers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2021-24786 – Download Monitor < 4.4.5 - Admin+ SQL Injection
https://notcve.org/view.php?id=CVE-2021-24786
The Download Monitor WordPress plugin before 4.4.5 does not properly validate and escape the "orderby" GET parameter before using it in a SQL statement when viewing the logs, leading to an SQL Injection issue El plugin Download Monitor de WordPress versiones anteriores a 4.4.5, no comprueba ni escapa del parámetro GET "orderby" antes de usarlo en una sentencia SQL cuando son visualizados los registros, conllevando un problema de inyección SQL WordPress Download Monitor WordPress plugin versions prior to 4.4.5 suffer from a remote SQL injection vulnerability. • https://www.exploit-db.com/exploits/50695 https://wpscan.com/vulnerability/a6571f16-66d2-449e-af83-1c6ddd56edfa • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2021-24774 – Check & Log Email < 1.0.3 - Admin+ SQL Injections
https://notcve.org/view.php?id=CVE-2021-24774
The Check & Log Email WordPress plugin before 1.0.3 does not validate and escape the "order" and "orderby" GET parameters before using them in a SQL statement when viewing logs, leading to SQL injections issues El plugin Check & Log Email de WordPress versiones anteriores a 1.0.3, no comprueba ni escapa de los parámetros GET "order" y "orderby" antes de usarlos en una sentencia SQL cuando son visualizados los registros, conllevando a problemas de inyecciones SQL • https://wpscan.com/vulnerability/f80ef09a-d3e2-4d62-8532-f0ebe59ae110 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2021-24446 – Remove Footer Credit < 1.0.6 - CSRF to Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2021-24446
The Remove Footer Credit WordPress plugin before 1.0.6 does not have CSRF check in place when saving its settings, which could allow attacker to make logged in admins change them and lead to Stored XSS issue as well due to the lack of sanitisation El plugin Remove Footer Credit de WordPress versiones anteriores a 1.0.6, no presenta una comprobación de tipo CSRF cuando guarda sus ajustes, lo que podría permitir a un atacante hacer que administradores registrados los cambien y conllevar a un problema de tipo XSS almacenado debido a una falta de saneo • https://wpscan.com/vulnerability/be55131b-d9f2-4ac1-b667-c544c066887f • CWE-352: Cross-Site Request Forgery (CSRF) •