5 results (0.015 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Server-Side Request Forgery (SSRF) vulnerability in WPGraphQL.This issue affects WPGraphQL: from n/a through 1.14.5. Vulnerabilidad de Server-Side Request Forgery (SSRF) en WPGraphQL. Este problema afecta a WPGraphQL: desde n/a hasta 1.14.5. The WPGraphQL plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 1.14.5 via createMediaItem. This can allow authenticated attackers with editor access or higher to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. • https://patchstack.com/database/vulnerability/wp-graphql/wordpress-wp-graphql-plugin-1-14-5-server-side-request-forgery-ssrf-vulnerability?_s_id=cve • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

The WPGraphQL WooCommerce WordPress plugin before 0.12.4 does not prevent unauthenticated attackers from enumerating a shop's coupon codes and values via GraphQL. El complemento WPGraphQL WooCommerce WordPress anterior a 0.12.4 no impide que atacantes no autenticados enumeren los códigos de cupón y los valores de una tienda a través de GraphQL. The WPGraphQL WooCommerce plugin for WordPress is vulnerable to Information Exposure in versions up to, and including, 0.11.0. This can allow unauthenticated attackers to extract coupon codes via GraphQL. • https://github.com/wp-graphql/wp-graphql-woocommerce https://wpscan.com/vulnerability/19138092-50d3-4d63-97c5-aa8e1ce39456 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 37%CPEs: 1EXPL: 4

The WPGraphQL 0.2.3 plugin for WordPress allows remote attackers to register a new user with admin privileges, whenever new user registrations are allowed. This is related to the registerUser mutation. El plugin The WPGraphQL 0.2.3 para WordPress, permite a los atacantes remotos registrar un nuevo usuario con privilegios de administrador, donde siempre que nuevos registros de usuarios sean permitidos. Esto esta relacionado con la mutación registerUser. The WPGraphQL versions up to 0.2.3 for WordPress allows remote attackers to register a new user with admin privileges, whenever new user registrations are allowed. • https://www.exploit-db.com/exploits/46886 http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html https://github.com/pentestpartners/snippets/blob/master/wp-graphql0.2.3_exploit.py https://github.com/wp-graphql/wp-graphql/releases/tag/v0.3.0 https://wpvulndb.com/vulnerabilities/9282 https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql • CWE-269: Improper Privilege Management CWE-306: Missing Authentication for Critical Function •

CVSS: 9.1EPSS: 2%CPEs: 1EXPL: 4

An issue was discovered in the WPGraphQL 0.2.3 plugin for WordPress. By querying the 'users' RootQuery, it is possible, for an unauthenticated attacker, to retrieve all WordPress users details such as email address, role, and username. Se descubrió un problema en el plugin WPGraphQL 0.2.3 para WordPress. Consultando los usuarios RootQuery, esto es posible por un atacante sin identificar, para recuperar todos los detalles de los usuarios WordPress, como direcciones de email, administrador, y nombre de usuario An issue was discovered in WPGraphQL up to 0.2.3 . By querying the 'users' RootQuery, it is possible, for an unauthenticated attacker, to retrieve all WordPress users details such as email address, role, and username. • https://www.exploit-db.com/exploits/46886 http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html https://github.com/pentestpartners/snippets/blob/master/wp-graphql0.2.3_exploit.py https://github.com/wp-graphql/wp-graphql/releases/tag/v0.3.0 https://wpvulndb.com/vulnerabilities/9282 https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-306: Missing Authentication for Critical Function •

CVSS: 5.3EPSS: 1%CPEs: 1EXPL: 4

The createComment mutation in the WPGraphQL 0.2.3 plugin for WordPress allows unauthenticated users to post comments on any article, even when 'allow comment' is disabled. La mutación create Comment en la WPGraphQL 0.2.3. para WordPress permite a los usuarios no identificados publicar comentarios en cualquier articulo, incluso, cuando la opción "permitir" está deshabilitada The createComment mutation in WPGraphQL up to version 0.2.3 for WordPress allows unauthenticated users to post comments on any article, even when 'allow comment' is disabled. WordPress WPGraphQL plugin version 0.2.3 suffers from authentication bypass and information disclosure vulnerabilities. • https://www.exploit-db.com/exploits/46886 http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html https://github.com/pentestpartners/snippets/blob/master/wp-graphql0.2.3_exploit.py https://github.com/wp-graphql/wp-graphql/releases/tag/v0.3.0 https://wpvulndb.com/vulnerabilities/9282 https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql • CWE-306: Missing Authentication for Critical Function CWE-862: Missing Authorization •