3 results (0.005 seconds)

CVSS: 8.1EPSS: 0%CPEs: 1EXPL: 0

The Email Log plugin for WordPress is vulnerable to Unauthenticated Hook Injection in all versions up to, and including, 2.4.8 via the check_nonce function. This makes it possible for unauthenticated attackers to execute actions with hooks in WordPress under certain circumstances. The action the attacker wishes to execute needs to have a nonce check, and the nonce needs to be known to the attacker. Furthermore, the absence of a capability check is a requirement. El complemento Email Log para WordPress es vulnerable a la inyección de gancho no autenticado en todas las versiones hasta la 2.4.8 incluida a través de la función check_nonce. • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3027872%40email-log&new=3027872%40email-log&sfp_email=&sfph_mail= https://wordpress.org/plugins/email-log https://www.wordfence.com/threat-intel/vulnerabilities/id/fd15268f-7e06-4e0d-baaf-f27348af61ce?source=cve • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The Email Log WordPress plugin before 2.4.8 does not escape the d parameter before outputting it back in an attribute in the Log page, leading to a Reflected Cross-Site Scripting issue El plugin Email Log de WordPress versiones anteriores a 2.4.8, no escapa del parámetro d antes de devolverlo a un atributo en la página de registro, conllevando a un problema de tipo Cross-Site Scripting Reflejado • https://wpscan.com/vulnerability/4621e86e-aba4-429c-8e08-32cf9b4c65e6 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The Email Log WordPress plugin before 2.4.7 does not properly validate, sanitise and escape the "orderby" and "order" GET parameters before using them in SQL statement in the admin dashboard, leading to SQL injections El plugin Email Log de WordPress versiones anteriores a 2.4.7, no comprueba, sanea y escapa de los parámetros GET "orderby" y "order" antes de usarlos en una sentencia SQL en el panel de administración, conllevando a inyecciones SQL • https://wpscan.com/vulnerability/8dd70db4-5845-440d-8b1d-012738abaac2 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •