
CVE-2025-32232 – WordPress StaffList plugin <= 3.2.6 - Broken Access Control vulnerability
https://notcve.org/view.php?id=CVE-2025-32232
04 Apr 2025 — Missing Authorization vulnerability in ERA404 StaffList allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects StaffList: from n/a through 3.2.6. The StaffList plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 3.2.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform an unauthorized action. • https://patchstack.com/database/wordpress/plugin/stafflist/vulnerability/wordpress-stafflist-plugin-3-2-6-broken-access-control-vulnerability?_s_id=cve • CWE-862: Missing Authorization •

CVE-2025-32255 – WordPress StaffList plugin <= 3.2.6 - Sensitive Data Exposure vulnerability
https://notcve.org/view.php?id=CVE-2025-32255
04 Apr 2025 — Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ERA404 StaffList allows Retrieve Embedded Sensitive Data. This issue affects StaffList: from n/a through 3.2.6. The StaffList plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.2.6. This makes it possible for unauthenticated attackers to extract sensitive user or configuration data. • https://patchstack.com/database/wordpress/plugin/stafflist/vulnerability/wordpress-stafflist-plugin-3-2-6-sensitive-data-exposure-vulnerability?_s_id=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere •

CVE-2024-13749 – StaffList <= 3.2.3 - Cross-Site Request Forgery to Reflected Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2024-13749
11 Feb 2025 — The StaffList plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.3. This is due to missing or incorrect nonce validation on the 'stafflist' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3232922%40stafflist&new=3232922%40stafflist&sfp_email=&sfph_mail= • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2022-1556 – StaffList < 3.1.5 - Admin+ SQLi
https://notcve.org/view.php?id=CVE-2022-1556
02 May 2022 — The StaffList WordPress plugin before 3.1.5 does not properly sanitise and escape a parameter before using it in a SQL statement when searching for Staff in the admin dashboard, leading to an SQL Injection El plugin StaffList de WordPress versiones anteriores a 3.1.5, no sanea y escapa de un parámetro antes de usarlo en una sentencia SQL cuando es buscado personal en el panel de administración, conllevando una inyección SQL • https://packetstormsecurity.com/files/166918 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •