CVE-2022-2223 – Image Slider <= 1.1.121 - Cross-Site Request Forgery to Post Duplication
https://notcve.org/view.php?id=CVE-2022-2223
The WordPress plugin Image Slider is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.1.121 due to failure to properly check for the existence of a nonce in the function ewic_duplicate_slider. This make it possible for unauthenticated attackers to duplicate existing posts or pages granted they can trick a site administrator into performing an action such as clicking on a link. El plugin Image Slider de WordPress es vulnerable a un ataque de tipo Cross-Site Request Forgery en versiones hasta 1.1.121 incluyéndola, debido a que no es comprobada apropiadamente la existencia de un nonce en la función ewic_duplicate_slider. Esto hace posible que atacantes no autenticados dupliquen publicaciones o páginas existentes concedidas pueden engañar a un administrador del sitio para que lleve a cabo una acción como hacer clic en un enlace • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2749352%40image-slider-widget&new=2749352%40image-slider-widget&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/6356e226-a449-4cd0-be60-2a1c9c70aa59?source=cve https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2223 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVE-2021-24463 – Image Slider by Ays - Responsive Slider and Carousel < 2.5.0 - Authenticated Blind SQL Injection
https://notcve.org/view.php?id=CVE-2021-24463
The get_sliders() function in the Image Slider by Ays- Responsive Slider and Carousel WordPress plugin before 2.5.0 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard La función get_sliders() del plugin de WordPress Image Slider by Ays- Responsive Slider and Carousel versiones anteriores a 2.5.0, no usaba la lista blanca ni comprobaba el parámetro orderby antes de usarlo en las sentencias SQL pasadas a las llamadas a la base de datos get_results(), conllevando a problemas de inyección SQL en el panel de administración • https://wpscan.com/vulnerability/994e6198-f0e9-4e30-989f-b5a3dfe95ded • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •