CVE-2022-0728 – Easy Smooth Scroll Links < 2.23.1 - Admin+ Stored Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2022-0728
The Easy Smooth Scroll Links WordPress plugin before 2.23.1 does not sanitise and escape its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed El plugin Easy Smooth Scroll Links de WordPress versiones anteriores a 2.23.1, no sanea ni escapa de su configuración, lo que podría permitir a usuarios con altos privilegios, como los administradores, llevar a cabo ataques de tipo Cross-Site Scripting incluso cuando la capacidad unfiltered_html no está permitida • https://wpscan.com/vulnerability/c6d3d308-4bf1-493f-86e9-dd623526e3c6 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-4974 – Freemius SDK <= 2.4.2 - Missing Authorization Checks
https://notcve.org/view.php?id=CVE-2022-4974
The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable. • https://www.wordfence.com/threat-intel/vulnerabilities/id/39fb0499-9ab4-4a2f-b0db-ece86bcf4d42?source=cve https://wpscan.com/vulnerability/6dae6dca-7474-4008-9fe5-4c62b9f12d0a https://freemius.com/blog/managing-security-issues-open-source-freemius-sdk-security-disclosure https://wpdirectory.net/search/01FWPVWA7BC5DYGZHNSZQ9QMN5 https://wpdirectory.net/search/01G02RSGMFS1TPT63FS16RWEYR https://web.archive.org/web/20220225174410/https%3A//www.pluginvulnerabilities.com/2022/02/25/our-security-review-of-wordpress-plugin-found-freemius-li • CWE-862: Missing Authorization •
CVE-2017-15811 – pootle button <= 1.1.1 - Reflected Cross-Site Scripting
https://notcve.org/view.php?id=CVE-2017-15811
The Pootle Button plugin before 1.2.0 for WordPress has XSS via the assets_url parameter in assets/dialog.php, exploitable via wp-admin/admin-ajax.php. El plugin Pootle Button en versiones anteriores a la 1.2.0 para WordPress tiene Cross-Site Scripting (XSS) mediante el parámetro assets_url en assets/dialog.php, explotable a través de wp-admin/admin-ajax.php. • https://packetstormsecurity.com/files/144582/WordPress-Pootle-Button-1.1.1-Cross-Site-Scripting.html https://plugins.trac.wordpress.org/changeset/1745805/pootle-button/tags https://wpvulndb.com/vulnerabilities/8930 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •