4 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in BeRocket Brands for WooCommerce plugin <= 3.7.0.6 versions. The Brands for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in versions up to, and including, 3.7.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://patchstack.com/database/vulnerability/brands-for-woocommerce/wordpress-brands-for-woocommerce-plugin-3-7-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

The Stockists Manager for Woocommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.2.1. This is due to missing nonce validation on the stockist_settings_main() function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. El plugin Stockists Manager for Woocommerce para WordPress es vulnerable a Cross-Site Request Forgery en versiones hasta 1.0.2.1 incluyéndola. Esto es debido a una falta de comprobación de nonce en la función stockist_settings_main(). • https://plugins.trac.wordpress.org/browser/stockists-manager/trunk/stockist_settings.php https://wordpress.org/plugins/stockists-manager https://www.wordfence.com/threat-intel/vulnerabilities/id/5b5e0204-4a05-45c1-833a-c2e4016d9830?source=cve https://www.wordfence.com/vulnerability-advisories/#CVE-2022-2518 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Advanced Product Labels for WooCommerce WordPress plugin before 1.2.3.7 does not sanitise and escape the tax_color_set_type parameter before outputting it back in the berocket_apl_color_listener AJAX action's response, leading to a Reflected Cross-Site Scripting El plugin Advanced Product Labels for WooCommerce de WordPress versiones anteriores a 1.2.3.7, no sanea y escapa del parámetro tax_color_set_type antes de devolverlo en la respuesta de la acción AJAX berocket_apl_color_listener, conllevando a un ataque de tipo Cross-Site Scripting Reflejado • https://plugins.trac.wordpress.org/changeset/2678919 https://wpscan.com/vulnerability/5e5fdcf4-ec2b-4e73-8009-05606b2d5164 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Advanced AJAX Product Filters WordPress plugin does not sanitise the 'term_id' POST parameter before outputting it in the page, leading to reflected Cross-Site Scripting issue. El complemento de WordPress Advanced AJAX Product Filters no sanitiza el parámetro POST 'term_id' antes de mostrarlo en la página, lo que genera un problema de cross site scripting reflejado. The Advanced AJAX Product Filters plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘term_id’ parameter in versions up to, and including, 1.5.4.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/b92ec5f7-d6a8-476f-a01e-21001a558914 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •