6 results (0.002 seconds)

CVSS: 10.0EPSS: 9%CPEs: 1EXPL: 1

23 Jun 2023 — The Popup by Supsystic WordPress plugin before 1.10.19 has a prototype pollution vulnerability that could allow an attacker to inject arbitrary properties into Object.prototype. The plugin Popup by Supsystic for WordPress is vulnerable to prototype pollution, which could make injecting malicious web scripts possible in some cases. • https://wpscan.com/vulnerability/545007fc-3173-47b1-82c4-ed3fd1247b9c • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 1

04 Apr 2023 — The ZYREX POPUP WordPress plugin through 1.0 does not validate the type of files uploaded when creating a popup, allowing a high privileged user (such as an Administrator) to upload arbitrary files, even when modifying the file system is disallowed, such as in a multisite install. The Zyrex Popup plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the zx_main_page function in versions up to, and including, 1.0. This makes it possible for authenticated attacker... • https://wpscan.com/vulnerability/0fd0d7a5-9263-43b6-9244-7880c3d3e6f4 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 1

20 Jun 2022 — A vulnerability was found in Supsystic Popup Plugin 1.7.6 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. • http://seclists.org/fulldisclosure/2017/Feb/97 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.3EPSS: 48%CPEs: 1EXPL: 1

18 Apr 2022 — The Popup by Supsystic WordPress plugin before 1.10.9 does not have any authentication and authorisation in an AJAX action, allowing unauthenticated attackers to call it and get the email addresses of subscribed users El plugin Popup by Supsystic de WordPress versiones hasta 1.10.9, no dispone de autenticación y autorización en una acción AJAX, permitiendo a atacantes no autenticados llamarlo y obtener las direcciones de correo electrónico de los usuarios suscritos • https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-306: Missing Authentication for Critical Function •

CVSS: 6.1EPSS: 7%CPEs: 1EXPL: 4

19 Apr 2021 — The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue El plugin Popup de Supsystic WordPress versiones anteriores a 1.10.5, no saneaba el parámetro tab de su página options antes de mostrarlo en un atributo, conllevando a un problema de tipo Cross-Site Scripting reflejado WordPress Popup plugin version 1.10.4 suffers from a cross site scripting vulnerability. • https://packetstorm.news/files/id/164311 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

07 Sep 2016 — The popup-by-supsystic plugin before 1.7.9 for WordPress has CSRF. El plugin popup-by-supsystic versiones anteriores a 1.7.9 para WordPress, presenta una vulnerabilidad de tipo CSRF. • https://wordpress.org/plugins/popup-by-supsystic/#developers • CWE-352: Cross-Site Request Forgery (CSRF) •