7 results (0.010 seconds)

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

08 Feb 2025 — The Super Store Finder plugin for WordPress is vulnerable to SQL Injection via the ‘ssf_wp_user_name’ parameter in all versions up to, and including, 7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into an already existing query to store cross-site scripting in store reviews. • https://superstorefinder.net/support/forums/topic/super-store-finder-for-wordpress-patch-notes • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 1

02 Oct 2023 — Super Store Finder 3.7 and below is vulnerable to authenticated Arbitrary PHP Code Injection that could lead to Remote Code Execution when settings overwrite config.inc.php content. Super Store Finder 3.7 y versiones anteriores son vulnerables a la inyección de código PHP arbitrario autenticado que podría provocar la ejecución remota de código cuando la configuración sobrescribe el contenido de config.inc.php. • https://packetstormsecurity.com/files/174756/Super-Store-Finder-3.7-Remote-Command-Execution.html • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 1

26 Sep 2023 — Super Store Finder v3.6 and below was discovered to contain a SQL injection vulnerability via the Search parameter at /admin/stores.php. Se descubrió que Super Store Finder v3.6 y versiones anteriores contenían una vulnerabilidad de inyección SQL a través del parámetro de búsqueda en /admin/stores.php. • https://github.com/TishaManandhar/Superstore-sql-poc/blob/main/SQL • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 0

18 Sep 2023 — The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.3. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details wit... • https://superstorefinder.net • CWE-862: Missing Authorization •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

05 Sep 2023 — Super Store Finder v3.6 was discovered to contain multiple SQL injection vulnerabilities in the store locator component via the products, distance, lat, and lng parameters. Se descubrió que Super Store Finder v3.6 contiene múltiples vulnerabilidades de inyección SQL en el componente "store locator" a través de los parámetros "products", "distance", "lat" y "lng". • https://github.com/redblueteam/CVE-2023-41507 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 1

05 Sep 2023 — A hard coded password in Super Store Finder v3.6 allows attackers to access the administration panel. Una contraseña incrustada en Super Store Finder v3.6 permite a los atacantes acceder al panel de administración. • https://github.com/redblueteam/CVE-2023-41508 • CWE-798: Use of Hard-coded Credentials •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

19 Jul 2023 — A vulnerability was found in Super Store Finder 3.6. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php of the component POST Parameter Handler. The manipulation of the argument products leads to sql injection. The attack can be launched remotely. • https://vuldb.com/?ctiid.234421 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •