CVE-2023-3186 – Supsystic Popup < 1.10.19 - Prototype Pollution
https://notcve.org/view.php?id=CVE-2023-3186
The Popup by Supsystic WordPress plugin before 1.10.19 has a prototype pollution vulnerability that could allow an attacker to inject arbitrary properties into Object.prototype. The plugin Popup by Supsystic for WordPress is vulnerable to prototype pollution, which could make injecting malicious web scripts possible in some cases. • https://wpscan.com/vulnerability/545007fc-3173-47b1-82c4-ed3fd1247b9c • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') •
CVE-2023-0924 – Zyrex Popup <= 1.0 - Admin+ Arbitrary File Upload
https://notcve.org/view.php?id=CVE-2023-0924
The ZYREX POPUP WordPress plugin through 1.0 does not validate the type of files uploaded when creating a popup, allowing a high privileged user (such as an Administrator) to upload arbitrary files, even when modifying the file system is disallowed, such as in a multisite install. The Zyrex Popup plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the zx_main_page function in versions up to, and including, 1.0. This makes it possible for authenticated attackers, with administrative privileges, to upload arbitrary files on the affected site's server which may make remote code execution possible. • https://wpscan.com/vulnerability/0fd0d7a5-9263-43b6-9244-7880c3d3e6f4 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2022-0424 – Popup by Supsystic < 1.10.9 - Unauthenticated Subscriber Email Addresses Disclosure
https://notcve.org/view.php?id=CVE-2022-0424
The Popup by Supsystic WordPress plugin before 1.10.9 does not have any authentication and authorisation in an AJAX action, allowing unauthenticated attackers to call it and get the email addresses of subscribed users El plugin Popup by Supsystic de WordPress versiones hasta 1.10.9, no dispone de autenticación y autorización en una acción AJAX, permitiendo a atacantes no autenticados llamarlo y obtener las direcciones de correo electrónico de los usuarios suscritos • https://wpscan.com/vulnerability/1e4593fd-51e5-43ca-a244-9aaef3804b9f • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-306: Missing Authentication for Critical Function •
CVE-2021-24275 – Popup by Supsystic < 1.10.5 - Reflected Cross-Site scripting (XSS)
https://notcve.org/view.php?id=CVE-2021-24275
The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue El plugin Popup de Supsystic WordPress versiones anteriores a 1.10.5, no saneaba el parámetro tab de su página options antes de mostrarlo en un atributo, conllevando a un problema de tipo Cross-Site Scripting reflejado WordPress Popup plugin version 1.10.4 suffers from a cross site scripting vulnerability. • https://www.exploit-db.com/exploits/50346 http://packetstormsecurity.com/files/164311/WordPress-Popup-1.10.4-Cross-Site-Scripting.html https://wpscan.com/vulnerability/efdc76e0-c14a-4baf-af70-9d381107308f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2016-10915 – Popup by Supsystic < 1.7.9 - Cross-Site Request Forgery
https://notcve.org/view.php?id=CVE-2016-10915
The popup-by-supsystic plugin before 1.7.9 for WordPress has CSRF. El plugin popup-by-supsystic versiones anteriores a 1.7.9 para WordPress, presenta una vulnerabilidad de tipo CSRF. • https://wordpress.org/plugins/popup-by-supsystic/#developers • CWE-352: Cross-Site Request Forgery (CSRF) •