CVE-2023-6257 – Inline Related Posts < 3.6.0 - Subscriber+ Password Protected Post Read
https://notcve.org/view.php?id=CVE-2023-6257
The Inline Related Posts WordPress plugin before 3.6.0 does not ensure that post content displayed via an AJAX action are accessible to the user, allowing any authenticated user, such as subscriber to retrieve the content of password protected posts El complemento Inline Related Posts de WordPress anterior a 3.6.0 no garantiza que el contenido de la publicación mostrado mediante una acción AJAX sea accesible para el usuario, lo que permite que cualquier usuario autenticado, como un suscriptor, recupere el contenido de las publicaciones protegidas con contraseña. The Inline Related Posts WordPress plugin before 3.6.0 is missing authorization in an AJAX action to ensure that users are allowed to see the content of the posts displayed, allowing any authenticated user, such as subscriber to retrieve the content of password protected posts The Inline Related Posts plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.5.0 via the irp_get_list_posts() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve the contents of password protected posts. • https://wpscan.com/vulnerability/19a86448-8d7c-4f02-9290-d9f93810e6e1 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-1983 – Simple Ajax Chat < 20240223 - Unauthenticated Stored XSS
https://notcve.org/view.php?id=CVE-2024-1983
The Simple Ajax Chat WordPress plugin before 20240223 does not prevent visitors from using malicious Names when using the chat, which will be reflected unsanitized to other users. The Simple Ajax Chat – Add a Fast, Secure Chat Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name field in all versions up to, and including, 20240216 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attacker to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/bf3a31de-a227-4db1-bd18-ce6a78dc96fb • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2024-2428 – The Ultimate Video Player For WordPress < 2.2.3 - Contributor+ Stored XSS
https://notcve.org/view.php?id=CVE-2024-2428
The Ultimate Video Player For WordPress WordPress plugin before 2.2.3 does not have proper capability check when updating its settings via a REST route, allowing Contributor and above users to update them. Furthermore, due to the lack of escaping in one of the settings, this also allows them to perform Stored XSS attacks El complemento Ultimate Video Player For WordPress para WordPress anterior a 2.2.3 no tiene una verificación de capacidad adecuada al actualizar su configuración a través de una ruta REST, lo que permite a Contributor y a los usuarios superiores actualizarlos. Además, debido a la falta de escape en una de las configuraciones, esto también les permite realizar ataques XSS almacenados. The The Ultimate Video Player For WordPress – by Presto Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's settings in all versions up to, and including, 2.2.2 due to missing authorization on a REST API endpoint and insufficient input sanitization and output escaping on the settinfs. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://wpscan.com/vulnerability/4832e223-4571-4b45-97db-2fd403797c49 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-6385 – WordPress Ping Optimizer <= 2.35.1.3.0 - Log Clearing via CSRF
https://notcve.org/view.php?id=CVE-2023-6385
The WordPress Ping Optimizer WordPress plugin through 2.35.1.3.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks such as clearing logs. El complemento WordPress Ping Optimizer hasta la versión 2.35.1.3.0 no tiene comprobaciones CSRF en algunos lugares, lo que podría permitir a los atacantes hacer que los usuarios que han iniciado sesión realicen acciones no deseadas a través de ataques CSRF, como borrar registros. The WordPress Ping Optimizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.35.1.3.0. This is due to missing or incorrect nonce validation on the wordpress-ping-optimizer/cbnet-ping-optimizer.php page. This makes it possible for unauthenticated attackers to clear logs via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/362c56ff-85eb-480f-a825-9670d4c0e3d0 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2024-0881 – Combo Blocks < 2.2.76 - Unauthenticated Password Protected Posts Access
https://notcve.org/view.php?id=CVE-2024-0881
The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel WordPress plugin before 2.2.76 does not prevent password protected posts from being displayed in the result of some unauthenticated AJAX actions, allowing unauthenticated users to read such posts El complemento Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel de WordPress anterior a 2.2.76 no impide que se muestren publicaciones protegidas con contraseña como resultado de algunas acciones AJAX no autenticadas, lo que permite a usuarios no autenticados leer dichas publicaciones. The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel WordPress plugin before 2.2.76 does not have proper authorization, resulting in password protected posts to be displayed in the result of some unauthenticated AJAX actions, allowing unauthenticated users to read such posts The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.74 via the post_grid_paginate_ajax_free AJAX endpoint. This makes it possible for unauthenticated attackers to retrieve private and password protected posts that may contain sensitive information. • https://wpscan.com/vulnerability/e460e926-6e9b-4e9f-b908-ba5c9c7fb290 • CWE-284: Improper Access Control •