Vulnerabilities (CVE)

Filtered by vendor Wpchill Subscribe
Total 33 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-25050 1 Wpchill 1 Remove Footer Credit 2024-11-21 3.5 LOW 4.8 MEDIUM
The Remove Footer Credit WordPress plugin before 1.0.11 does properly sanitise its settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.
CVE-2021-24908 1 Wpchill 1 Check \& Log Email 2024-11-21 2.6 LOW 6.1 MEDIUM
The Check & Log Email WordPress plugin before 1.0.4 does not escape the d parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting
CVE-2021-24786 1 Wpchill 1 Download Monitor 2024-11-21 6.5 MEDIUM 7.2 HIGH
The Download Monitor WordPress plugin before 4.4.5 does not properly validate and escape the "orderby" GET parameter before using it in a SQL statement when viewing the logs, leading to an SQL Injection issue
CVE-2021-24774 1 Wpchill 1 Check \& Log Email 2024-11-21 6.5 MEDIUM 7.2 HIGH
The Check & Log Email WordPress plugin before 1.0.3 does not validate and escape the "order" and "orderby" GET parameters before using them in a SQL statement when viewing logs, leading to SQL injections issues
CVE-2021-24446 1 Wpchill 1 Remove Footer Credit 2024-11-21 6.0 MEDIUM 5.4 MEDIUM
The Remove Footer Credit WordPress plugin before 1.0.6 does not have CSRF check in place when saving its settings, which could allow attacker to make logged in admins change them and lead to Stored XSS issue as well due to the lack of sanitisation
CVE-2021-23174 1 Wpchill 1 Download Monitor 2024-11-21 3.5 LOW 3.4 LOW
Authenticated (admin+) Persistent Cross-Site Scripting (XSS) vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6) Vulnerable parameters: &post_title, &downloadable_file_version[0].
CVE-2020-8549 1 Wpchill 1 Strong Testimonials 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Stored XSS in the Strong Testimonials plugin before 2.40.1 for WordPress can result in an attacker performing malicious actions such as stealing session tokens.
CVE-2024-49256 1 Wpchill 1 Htaccess File Editor 2024-11-19 N/A 8.8 HIGH
Incorrect Authorization vulnerability in WPChill Htaccess File Editor allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Htaccess File Editor: from n/a through 1.0.18.
CVE-2024-47362 1 Wpchill 1 Strong Testimonials 2024-11-05 N/A 8.8 HIGH
Missing Authorization vulnerability in WPChill Strong Testimonials allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Strong Testimonials: from n/a through 3.1.16.
CVE-2022-4972 1 Wpchill 1 Download Monitor 2024-10-30 N/A 7.5 HIGH
The Download Monitor plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several REST-API routes related to reporting in versions up to, and including, 4.7.51. This makes it possible for unauthenticated attackers to view user data and other sensitive information intended for administrators.
CVE-2023-6491 1 Wpchill 1 Strong Testimonials 2024-10-29 N/A 4.3 MEDIUM
The Strong Testimonials plugin for WordPress is vulnerable to unauthorized modification of data due to an improper capability check on the wpmtst_save_view_sticky function in all versions up to, and including, 3.1.12. This makes it possible for authenticated attackers, with contributor access and above, to modify favorite views.
CVE-2024-8552 1 Wpchill 1 Download Monitor 2024-10-02 N/A 4.3 MEDIUM
The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the enable_shop() function in all versions up to, and including, 5.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable shop functionality.
CVE-2024-6571 1 Wpchill 1 Optimize Images Alt Text \(alt Tag\) \& Names For Seo Using Ai 2024-08-14 N/A 5.3 MEDIUM
The Optimize Images ALT Text (alt tag) & names for SEO using AI plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.1.1. This is due the plugin utilizing cocur and not preventing direct access to the generate-default.php file. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.