
CVE-2025-0357 – WPBookit <= 1.6.9 - Unauthenticated Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2025-0357
24 Jan 2025 — The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://documentation.iqonic.design/wpbookit/versions/change-log • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2024-10215 – WPBookit <= 1.6.4 - Unauthenticated Arbitrary User Password Change
https://notcve.org/view.php?id=CVE-2024-10215
09 Jan 2025 — The WPBookit plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.6.4. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. • https://documentation.iqonic.design/wpbookit/versions/change-log • CWE-639: Authorization Bypass Through User-Controlled Key •

CVE-2023-41128 – WordPress WP Roadmap Plugin <= 1.0.8 is vulnerable to Cross Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2023-41128
23 Nov 2023 — Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Iqonic Design WP Roadmap – Product Feedback Board allows Stored XSS.This issue affects WP Roadmap – Product Feedback Board: from n/a through 1.0.8. Vulnerabilidad de neutralización inadecuada de la entrada durante la generación de páginas web ('Cross-site Scripting') en Iqonic Design WP Roadmap – Product Feedback Board permite almacenar XSS. Este problema afecta a WP Roadmap – Product Feedback Board: desde ... • https://patchstack.com/database/vulnerability/wp-roadmap/wordpress-wp-roadmap-plugin-1-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-2623 – KiviCare Management System < 3.2.1 - Subscriber+ Sensitive Information Disclosure
https://notcve.org/view.php?id=CVE-2023-2623
05 Jun 2023 — The KiviCare WordPress plugin before 3.2.1 does not restrict the information returned in a response and returns all user data, allowing low privilege users such as subscriber to retrieve sensitive information such as the user email and hashed password of other users The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.2.0. This can allow authenticated attackers to extract sensitive data including emai... • https://wpscan.com/vulnerability/85cc39b1-416f-4d23-84c1-fdcbffb0dda0 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2023-2624 – KiviCare Management System < 3.2.1 - Reflected Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2023-2624
05 Jun 2023 — The KiviCare WordPress plugin before 3.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrator The KiviCare plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'filterType' parameter in versions up to, and including, 3.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to injec... • https://packetstorm.news/files/id/174895 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-2627 – KiviCare Management System < 3.2.1 - Subscriber+ Unauthorised AJAX Calls
https://notcve.org/view.php?id=CVE-2023-2627
05 Jun 2023 — The KiviCare WordPress plugin before 3.2.1 does not have proper CSRF and authorisation checks in various AJAX actions, allowing any authenticated users, such as subscriber to call them. Attacks include but are not limited to: Add arbitrary Clinic Admin/Doctors/etc and update plugin's settings The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to unauthorized access to and modification of data due to missing capability checks on multiple AJAX functions in versions up t... • https://wpscan.com/vulnerability/162d0029-2adc-4925-9985-1d5d672dbe75 • CWE-862: Missing Authorization •

CVE-2023-2628 – KiviCare Management System < 3.2.1 - Multiple CSRF
https://notcve.org/view.php?id=CVE-2023-2628
05 Jun 2023 — The KiviCare WordPress plugin before 3.2.1 does not have CSRF checks (either flawed or missing completely) in various AJAX actions, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks. This includes, but is not limited to: Delete arbitrary appointments/medical records/etc, create/update various users (patients, doctors etc) The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and ... • https://wpscan.com/vulnerability/e0741e2c-c529-4815-8744-16e01cdb0aed • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2022-0786 – KiviCare < 2.3.9 - Unauthenticated SQLi
https://notcve.org/view.php?id=CVE-2022-0786
23 May 2022 — The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to SQL Injections exploitable by unauthenticated users El plugin KiviCare de WordPress versiones anteriores a 2.3.9, no sanea ni escapa de algunos parámetros antes de usarlos en sentencias SQL por medio de la acción AJAX ajax_post con la ruta get_doctor_details, conllevando a inyecciones SQL explotables por usuari... • https://wpscan.com/vulnerability/53f493e9-273b-4349-8a59-f2207e8f8f30 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •