3 results (0.009 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The JetEngine WordPress plugin before 3.1.3.1 includes uploaded files without adequately ensuring that they are not executable, leading to a remote code execution vulnerability. The Crocoblock JetEngine plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in versions up to, and including, 3.1.3. This makes it possible for authenticated attackers with author-level permissions and above to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://wpscan.com/vulnerability/2a81b6b1-2339-4889-9c28-1af133df8b65 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Crocoblock JetEngine before 2.9.1 does not properly validate and sanitize form data. Crocoblock JetEngine versiones anteriores a 2.9.1, no comprueba ni sanea correctamente los datos del formulario • https://crocoblock.com/changelog/?plugin=jet-engine • CWE-20: Improper Input Validation •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

Crocoblock JetEngine before 2.6.1 allows XSS by remote authenticated users via a custom form input. Crocoblock JetEngine versiones anteriores a 2.6.1, permite un ataque de tipo XSS por parte de usuarios autenticados remotos por medio de una entrada de formulario personalizada. • https://crocoblock.com/changelog/?plugin=jet-engine https://crocoblock.com/plugins/jetengine • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •