CVE-2024-12329 – Essential Real Estate <= 5.1.6 - Missing Authorization to Authenticated (Contributor+) Information Exposure
https://notcve.org/view.php?id=CVE-2024-12329
The Essential Real Estate plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on several pages/post types in all versions up to, and including, 5.1.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to access invoices and transaction logs • https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3204549%40essential-real-estate&new=3204549%40essential-real-estate&sfp_email=&sfph_mail= https://www.wordfence.com/threat-intel/vulnerabilities/id/fa5b1bf3-344e-4ae6-87b9-2dcaafd417a5?source=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2024-4274 – Essential Real Estate <= 4.4.2 - Insecure Direct Object Reference to Arbitrary Attachment Deletion
https://notcve.org/view.php?id=CVE-2024-4274
The Essential Real Estate plugin for WordPress is vulnerable to unauthorized loss of data due to insufficient validation on the remove_property_attachment_ajax() function in all versions up to, and including, 4.4.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary attachments. El complemento Essential Real Estate para WordPress es vulnerable a la pérdida no autorizada de datos debido a una validación insuficiente de la función remove_property_attachment_ajax() en todas las versiones hasta la 4.4.2 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen archivos adjuntos arbitrarios. • https://plugins.trac.wordpress.org/browser/essential-real-estate/trunk/public/partials/property/class-ere-property.php#L28 https://www.wordfence.com/threat-intel/vulnerabilities/id/7dc41eb7-5c9a-4a67-902d-9a855840668b?source=cve • CWE-639: Authorization Bypass Through User-Controlled Key •
CVE-2024-4273 – Essential Real Estate <= 4.4.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
https://notcve.org/view.php?id=CVE-2024-4273
The Essential Real Estate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ere_property_map' shortcode in all versions up to, and including, 4.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. El complemento Essential Real Estate para WordPress es vulnerable a Cross-Site Scripting Almacenado a través del código corto 'ere_property_map' del complemento en todas las versiones hasta la 4.4.2 incluida debido a una sanitización de entrada insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. • https://wordpress.org/plugins/essential-real-estate https://www.wordfence.com/threat-intel/vulnerabilities/id/c62ec31a-55e9-4404-b860-fa9a51ba3d3f?source=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2023-6140 – Essential Real Estate < 4.4 - Subscriber+ Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2023-6140
The Essential Real Estate WordPress plugin before 4.4.0 does not prevent users with limited privileges on the site, like subscribers, from momentarily uploading malicious PHP files disguised as ZIP archives, which may lead to remote code execution. El complemento Essential Real Estate de WordPress anterior a 4.4.0 no impide que los usuarios con privilegios limitados en el sitio, como los suscriptores, carguen momentáneamente archivos PHP maliciosos disfrazados de archivos ZIP, lo que puede provocar la ejecución remota de código. • https://wpscan.com/vulnerability/c837eaf3-fafd-45a2-8f5e-03afb28a765b • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2023-6139 – Essential Real Estate < 4.4.0 - Subscriber+ Denial of Service via Arbitrary Option Update
https://notcve.org/view.php?id=CVE-2023-6139
The Essential Real Estate WordPress plugin before 4.4.0 does not apply proper capability checks on its AJAX actions, which among other things, allow attackers with a subscriber account to conduct Denial of Service attacks. El complemento Essential Real Estate de WordPress anterior a 4.4.0 no aplica comprobaciones de capacidad adecuadas en sus acciones AJAX, que, entre otras cosas, permiten a atacantes con una cuenta de suscriptor realizar ataques de denegación de servicio. The Essential Real Estate plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the gsf_save_options AJAX action in all versions up to, and including, 4.3.5. This makes it possible for authenticated attackers, with subscriber-level access and above, to update the plugin's settings which can lead to a denial of service. • https://wpscan.com/vulnerability/96396a22-f523-4c51-8b72-52be266988aa • CWE-862: Missing Authorization •