Total
11 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-47853 | 1 Mycred | 1 Mycred | 2024-11-21 | N/A | 6.5 MEDIUM |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in myCred myCred – Points, Rewards, Gamification, Ranks, Badges & Loyalty Plugin allows Stored XSS.This issue affects myCred – Points, Rewards, Gamification, Ranks, Badges & Loyalty Plugin: from n/a through 2.6.1. | |||||
CVE-2023-35096 | 1 Mycred | 1 Mycred | 2024-11-21 | N/A | 5.4 MEDIUM |
Cross-Site Request Forgery (CSRF) vulnerability in myCred plugin <= 2.5 versions. | |||||
CVE-2022-1092 | 1 Mycred | 1 Mycred | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
The myCred WordPress plugin before 2.4.3.1 does not have authorisation and CSRF checks in its mycred-tools-import-export AJAX action, allowing any authenticated user to call and and retrieve the list of email address present in the blog | |||||
CVE-2022-0363 | 1 Mycred | 1 Mycred | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
The myCred WordPress plugin before 2.4.3.1 does not have any authorisation and CSRF checks in the mycred-tools-import-export AJAX action, allowing any authenticated users, such as subscribers, to call it and import mycred setup, thus creating badges, managing points or creating arbitrary posts. | |||||
CVE-2022-0287 | 1 Mycred | 1 Mycred | 2024-11-21 | 4.0 MEDIUM | 4.3 MEDIUM |
The myCred WordPress plugin before 2.4.4.1 does not have any authorisation in place in its mycred-tools-select-user AJAX action, allowing any authenticated user, such as subscriber to call and retrieve all email addresses from the blog | |||||
CVE-2021-25015 | 1 Mycred | 1 Mycred | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
The myCred WordPress plugin before 2.4 does not sanitise and escape the search query before outputting it back in the history dashboard page, leading to a Reflected Cross-Site Scripting issue | |||||
CVE-2021-24755 | 1 Mycred | 1 Mycred | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The myCred WordPress plugin before 2.3 does not validate or escape the fields parameter before using it in a SQL statement, leading to an SQL injection exploitable by any authenticated user | |||||
CVE-2017-20008 | 1 Mycred | 1 Mycred | 2024-11-21 | 4.3 MEDIUM | 6.1 MEDIUM |
The myCred WordPress plugin before 1.7.8 does not sanitise and escape the user parameter before outputting it back in the Points Log admin dashboard, leading to a Reflected Cross-Site Scripting | |||||
CVE-2024-10187 | 1 Mycred | 1 Mycred | 2024-11-13 | N/A | 5.4 MEDIUM |
The myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's mycred_link shortcode in all versions up to, and including, 2.7.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |||||
CVE-2024-8658 | 1 Mycred | 1 Mycred | 2024-10-02 | N/A | 5.3 MEDIUM |
The myCred – Loyalty Points and Rewards plugin for WordPress and WooCommerce – Give Points, Ranks, Badges, Cashback, WooCommerce rewards, and WooCommerce credits for Gamification plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the mycred_update_database() function in all versions up to, and including, 2.7.3. This makes it possible for unauthenticated attackers to upgrade an out of date database. | |||||
CVE-2024-43214 | 1 Mycred | 1 Mycred | 2024-09-12 | N/A | 5.3 MEDIUM |
Missing Authorization vulnerability in myCred.This issue affects myCred: from n/a through 2.7.2. |