Filtered by vendor Wpdeveloper
Subscribe
Total
60 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2020-36744 | 1 Wpdeveloper | 1 Notificationx | 2024-02-28 | N/A | 4.3 MEDIUM |
The NotificationX plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.2. This is due to missing or incorrect nonce validation on the generate_conversions() function. This makes it possible for unauthenticated attackers to generate conversions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |||||
CVE-2023-32243 | 1 Wpdeveloper | 1 Essential Addons For Elementor | 2024-02-28 | N/A | 9.8 CRITICAL |
Improper Authentication vulnerability in WPDeveloper Essential Addons for Elementor allows Privilege Escalation. This issue affects Essential Addons for Elementor: from 5.4.0 through 5.7.1. | |||||
CVE-2023-2833 | 1 Wpdeveloper | 1 Reviewx | 2024-02-28 | N/A | 8.8 HIGH |
The ReviewX plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.6.13 due to insufficient restriction on the 'rx_set_screen_options' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wp_screen_options[option]' and 'wp_screen_options[value]' parameters during a screen option update. | |||||
CVE-2023-2084 | 1 Wpdeveloper | 1 Essential Blocks | 2024-02-28 | N/A | 4.3 MEDIUM |
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the get function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check. | |||||
CVE-2023-2087 | 1 Wpdeveloper | 1 Essential Blocks | 2024-02-28 | N/A | 4.3 MEDIUM |
The Essential Blocks plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.6. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |||||
CVE-2023-2085 | 1 Wpdeveloper | 1 Essential Blocks | 2024-02-28 | N/A | 4.3 MEDIUM |
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the templates function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check. | |||||
CVE-2023-2086 | 1 Wpdeveloper | 1 Essential Blocks | 2024-02-28 | N/A | 4.3 MEDIUM |
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the template_count function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check. | |||||
CVE-2023-3371 | 1 Wpdeveloper | 1 Embedpress | 2024-02-28 | N/A | 7.5 HIGH |
The User Registration plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'lock_content_form_handler' and 'display_password_form' function in versions up to, and including, 3.7.3. This makes it possible for unauthenticated attackers to decrypt and view the password protected content. | |||||
CVE-2023-26325 | 1 Wpdeveloper | 1 Reviewx | 2024-02-28 | N/A | 8.8 HIGH |
The 'rx_export_review' action in the ReviewX WordPress Plugin, is affected by an authenticated SQL injection vulnerability in the 'filterValue' and 'selectedColumns' parameters. | |||||
CVE-2022-0683 | 1 Wpdeveloper | 1 Essential Addons For Elementor | 2024-02-28 | 4.3 MEDIUM | 6.1 MEDIUM |
The Essential Addons for Elementor Lite WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the settings parameter found in the ~/includes/Traits/Helper.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user clicks on a specially crafted link by an attacker. This affects versions up to and including 5.0.8. | |||||
CVE-2022-0349 | 1 Wpdeveloper | 1 Notificationx | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
The NotificationX WordPress plugin before 2.3.9 does not sanitise and escape the nx_id parameter before using it in a SQL statement, leading to an Unauthenticated Blind SQL Injection | |||||
CVE-2022-0320 | 1 Wpdeveloper | 1 Essential Addons For Elementor | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
The Essential Addons for Elementor WordPress plugin before 5.0.5 does not validate and sanitise some template data before it them in include statements, which could allow unauthenticated attackers to perform Local File Inclusion attack and read arbitrary files on the server, this could also lead to RCE via user uploaded files or other LFI to RCE techniques. | |||||
CVE-2021-24812 | 1 Wpdeveloper | 1 Betterlinks | 2024-02-28 | 3.5 LOW | 5.4 MEDIUM |
The BetterLinks WordPress plugin before 1.2.6 does not sanitise and escape some of imported link fields, which could lead to Stored Cross-Site Scripting issues when an admin import a malicious CSV. | |||||
CVE-2021-24633 | 1 Wpdeveloper | 1 Countdown Block | 2024-02-28 | 4.0 MEDIUM | 4.3 MEDIUM |
The Countdown Block WordPress plugin before 1.1.2 does not have authorisation in the eb_write_block_css AJAX action, which allows any authenticated user, such as Subscriber, to modify post contents displayed to users. | |||||
CVE-2021-24355 | 1 Wpdeveloper | 1 Simple 301 Redirects | 2024-02-28 | 4.0 MEDIUM | 4.3 MEDIUM |
In the Simple 301 Redirects by BetterLinks WordPress plugin before 2.0.4, the lack of capability checks and insufficient nonce check on the AJAX actions, simple301redirects/admin/get_wildcard and simple301redirects/admin/wildcard, made it possible for authenticated users to retrieve and update the wildcard value for redirects. | |||||
CVE-2021-24354 | 1 Wpdeveloper | 1 Simple 301 Redirects | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
A lack of capability checks and insufficient nonce check on the AJAX action in the Simple 301 Redirects by BetterLinks WordPress plugin before 2.0.4, made it possible for authenticated users to install arbitrary plugins on vulnerable sites. | |||||
CVE-2021-24353 | 1 Wpdeveloper | 1 Simple 301 Redirects | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
The import_data function of the Simple 301 Redirects by BetterLinks WordPress plugin before 2.0.4 had no capability or nonce checks making it possible for unauthenticated users to import a set of site redirects. | |||||
CVE-2021-24352 | 1 Wpdeveloper | 1 Simple 301 Redirects | 2024-02-28 | 6.8 MEDIUM | 8.8 HIGH |
The export_data function of the Simple 301 Redirects by BetterLinks WordPress plugin before 2.0.4 had no capability or nonce checks making it possible for unauthenticated users to export a site's redirects. | |||||
CVE-2021-24356 | 1 Wpdeveloper | 1 Simple 301 Redirects | 2024-02-28 | 6.5 MEDIUM | 8.8 HIGH |
In the Simple 301 Redirects by BetterLinks WordPress plugin before 2.0.4, a lack of capability checks and insufficient nonce check on the AJAX action, simple301redirects/admin/activate_plugin, made it possible for authenticated users to activate arbitrary plugins installed on vulnerable sites. | |||||
CVE-2021-24255 | 1 Wpdeveloper | 1 Essential Addons For Elementor | 2024-02-28 | 3.5 LOW | 5.4 MEDIUM |
The Essential Addons for Elementor Lite WordPress Plugin before 4.5.4 has two widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, both via a similar method. |