6 results (0.001 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) vulnerability in 10up ElasticPress.This issue affects ElasticPress: from n/a through 5.1.1. Vulnerabilidad de Cross-Site Request Forgery (CSRF) en 10up ElasticPress. Este problema afecta a ElasticPress: desde n/a hasta 5.1.0. The ElasticPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.1.0. This is due to missing or incorrect nonce validation on the do_sync function. • https://patchstack.com/database/vulnerability/elasticpress/wordpress-elasticpress-plugin-5-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

The Restricted Site Access WordPress plugin before 7.3.2 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations in certain situations. El plugin Restricted Site Access de WordPress versiones anteriores a 7.3.2, prioriza la obtención de la IP de un visitante a partir de determinados encabezados HTTP sobre REMOTE_ADDR de PHP, lo que hace posible saltarse las limitaciones basadas en la IP en determinadas situaciones. The Restricted Site Access plugin for WordPress is vulnerable to IP Spoofing in versions up to, and including, 7.3.1 due to prioritizing getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR. This makes it possible to bypass IP-based limitations in certain situations. • https://wpscan.com/vulnerability/c03863ef-9ac9-402b-8f8d-9559c9988e2b • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 1

The sanitisation step of the Safe SVG WordPress plugin before 1.9.10 can be bypassed by spoofing the content-type in the POST request to upload a file. Exploiting this vulnerability, an attacker will be able to perform the kinds of attacks that this plugin should prevent (mainly XSS, but depending on further use of uploaded SVG files potentially other XML attacks). El paso de saneo del plugin Safe SVG de WordPress versiones anteriores a 1.9.10, puede ser omitido al suplantar el tipo de contenido en la petición POST para subir un archivo. Explotando esta vulnerabilidad, un atacante podrá llevar a cabo los tipos de ataques que este plugin debería prevenir (principalmente de tipo XSS, pero dependiendo del uso posterior de los archivos SVG subidos, potencialmente otros ataques XML) • https://github.com/10up/safe-svg/pull/28 https://wpscan.com/vulnerability/4d12533e-bdb7-411f-bcdf-4c5046db13f3 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The ElasticPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.5.3. This is due to missing or incorrect nonce validation on the epio_send_autosuggest_allowed() function. This makes it possible for unauthenticated attackers to send allowed parameters for autosuggest to elasticpress[.]io via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. El plugin ElasticPress para WordPress es vulnerable a ataques de tipo Cross-Site Request Forgery (CSRF) en versiones hasta la 3.5.3 inclusive. Esto es debido a la falta o incorrecta validación nonce en la función "epio_send_autosuggest_allowed()". • https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1 https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2 https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3 https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4 https://blo • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A Denial Of Service vulnerability exists in the safe-svg (aka Safe SVG) plugin through 1.9.4 for WordPress, related to unlimited recursion for a '<use ... xlink:href="#identifier">' substring. Se presenta una vulnerabilidad de Denegación De Servicio en el plugin safe-svg (también se conoce como Safe SVG) versiones hasta 1.9.4 para WordPress, relacionado con la recursividad ilimitada para una subcadena ''. • https://fortiguard.com/zeroday/FG-VD-19-113 https://plugins.trac.wordpress.org/changeset/2185438 https://wordpress.org/plugins/safe-svg/#developers https://wpvulndb.com/vulnerabilities/9937 • CWE-400: Uncontrolled Resource Consumption CWE-674: Uncontrolled Recursion •