6 results (0.021 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Server-Side Request Forgery (SSRF) vulnerability in WPGraphQL.This issue affects WPGraphQL: from n/a through 1.14.5. Vulnerabilidad de Server-Side Request Forgery (SSRF) en WPGraphQL. Este problema afecta a WPGraphQL: desde n/a hasta 1.14.5. The WPGraphQL plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 1.14.5 via createMediaItem. This can allow authenticated attackers with editor access or higher to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. • https://patchstack.com/database/vulnerability/wp-graphql/wordpress-wp-graphql-plugin-1-14-5-server-side-request-forgery-ssrf-vulnerability?_s_id=cve • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 1

The WPGraphQL WooCommerce WordPress plugin before 0.12.4 does not prevent unauthenticated attackers from enumerating a shop's coupon codes and values via GraphQL. El complemento WPGraphQL WooCommerce WordPress anterior a 0.12.4 no impide que atacantes no autenticados enumeren los códigos de cupón y los valores de una tienda a través de GraphQL. The WPGraphQL WooCommerce plugin for WordPress is vulnerable to Information Exposure in versions up to, and including, 0.11.0. This can allow unauthenticated attackers to extract coupon codes via GraphQL. • https://github.com/wp-graphql/wp-graphql-woocommerce https://wpscan.com/vulnerability/19138092-50d3-4d63-97c5-aa8e1ce39456 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 2

The WPGraphQL WordPress plugin before 0.3.5 doesn't properly restrict access to information about other users' roles on the affected site. Because of this, a remote attacker could forge a GraphQL query to retrieve the account roles of every user on the site. El plugin WPGraphQL de WordPress versiones anteriores a 0.3.5, no restringe apropiadamente el acceso a la información sobre los roles de otros usuarios en el sitio afectado. Debido a esto, un atacante remoto podría falsificar una consulta GraphQL para recuperar los roles de la cuenta de cada usuario en el sitio • https://github.com/wp-graphql/wp-graphql/pull/900 https://wpscan.com/vulnerability/393be73a-f8dc-462f-8670-f20ab89421fc • CWE-284: Improper Access Control •

CVSS: 9.8EPSS: 32%CPEs: 1EXPL: 4

The WPGraphQL 0.2.3 plugin for WordPress allows remote attackers to register a new user with admin privileges, whenever new user registrations are allowed. This is related to the registerUser mutation. El plugin The WPGraphQL 0.2.3 para WordPress, permite a los atacantes remotos registrar un nuevo usuario con privilegios de administrador, donde siempre que nuevos registros de usuarios sean permitidos. Esto esta relacionado con la mutación registerUser. The WPGraphQL versions up to 0.2.3 for WordPress allows remote attackers to register a new user with admin privileges, whenever new user registrations are allowed. • https://www.exploit-db.com/exploits/46886 http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html https://github.com/pentestpartners/snippets/blob/master/wp-graphql0.2.3_exploit.py https://github.com/wp-graphql/wp-graphql/releases/tag/v0.3.0 https://wpvulndb.com/vulnerabilities/9282 https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql • CWE-269: Improper Privilege Management CWE-306: Missing Authentication for Critical Function •

CVSS: 9.1EPSS: 1%CPEs: 1EXPL: 4

An issue was discovered in the WPGraphQL 0.2.3 plugin for WordPress. By querying the 'users' RootQuery, it is possible, for an unauthenticated attacker, to retrieve all WordPress users details such as email address, role, and username. Se descubrió un problema en el plugin WPGraphQL 0.2.3 para WordPress. Consultando los usuarios RootQuery, esto es posible por un atacante sin identificar, para recuperar todos los detalles de los usuarios WordPress, como direcciones de email, administrador, y nombre de usuario An issue was discovered in WPGraphQL up to 0.2.3 . By querying the 'users' RootQuery, it is possible, for an unauthenticated attacker, to retrieve all WordPress users details such as email address, role, and username. • https://www.exploit-db.com/exploits/46886 http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html https://github.com/pentestpartners/snippets/blob/master/wp-graphql0.2.3_exploit.py https://github.com/wp-graphql/wp-graphql/releases/tag/v0.3.0 https://wpvulndb.com/vulnerabilities/9282 https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-306: Missing Authentication for Critical Function •