Vulnerabilities (CVE)

Filtered by vendor Pickplugins Subscribe
Filtered by product Post Grid
Total 10 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-1988 1 Pickplugins 1 Post Grid 2024-11-21 N/A 6.4 MEDIUM
The Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel – Combo Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag' attribute in blocks in all versions up to, and including, 2.2.80 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2022-0447 1 Pickplugins 1 Post Grid 2024-11-21 3.5 LOW 6.4 MEDIUM
The Post Grid WordPress plugin before 2.1.16 does not sanitise and escape the post_types parameter before outputting it back in the response of the post_grid_update_taxonomies_terms_by_posttypes AJAX action, available to any authenticated users, leading to a Reflected Cross-Site Scripting
CVE-2021-24986 1 Pickplugins 1 Post Grid 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
The Post Grid WordPress plugin before 2.1.16 does not escape the keyword parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting in pages containing a Post Grid with a search form
CVE-2021-24488 1 Pickplugins 1 Post Grid 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
The slider import search feature and tab parameter of the Post Grid WordPress plugin before 2.1.8 settings are not properly sanitised before being output back in the pages, leading to Reflected Cross-Site Scripting issues
CVE-2020-35939 1 Pickplugins 2 Post Grid, Team Showcase 2024-11-21 6.0 MEDIUM 7.5 HIGH
PHP Object injection vulnerabilities in the Team Showcase plugin before 1.22.16 for WordPress allow remote authenticated attackers to inject arbitrary PHP objects due to insecure unserialization of data supplied in a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to team_import_xml_layouts.
CVE-2020-35938 1 Pickplugins 2 Post Grid, Team Showcase 2024-11-21 6.0 MEDIUM 7.5 HIGH
PHP Object injection vulnerabilities in the Post Grid plugin before 2.0.73 for WordPress allow remote authenticated attackers to inject arbitrary PHP objects due to insecure unserialization of data supplied in a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to post_grid_import_xml_layouts.
CVE-2020-35937 1 Pickplugins 2 Post Grid, Team Showcase 2024-11-21 6.0 MEDIUM 7.5 HIGH
Stored Cross-Site Scripting (XSS) vulnerabilities in the Team Showcase plugin before 1.22.16 for WordPress allow remote authenticated attackers to import layouts including JavaScript supplied via a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to team_import_xml_layouts.
CVE-2020-35936 1 Pickplugins 2 Post Grid, Team Showcase 2024-11-21 6.0 MEDIUM 7.5 HIGH
Stored Cross-Site Scripting (XSS) vulnerabilities in the Post Grid plugin before 2.0.73 for WordPress allow remote authenticated attackers to import layouts including JavaScript supplied via a remotely hosted crafted payload in the source parameter via AJAX. The action must be set to post_grid_import_xml_layouts.
CVE-2021-4450 1 Pickplugins 1 Post Grid 2024-10-30 N/A 8.8 HIGH
The Post Grid plugin for WordPress is vulnerable to blind SQL Injection via post metadata in versions up to, and including, 2.1.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level permissions and above to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CVE-2024-8253 1 Pickplugins 1 Post Grid 2024-09-25 N/A 8.8 HIGH
The Post Grid and Gutenberg Blocks plugin for WordPress is vulnerable to privilege escalation in all versions 2.2.87 to 2.2.90. This is due to the plugin not properly restricting what user meta values can be updated and ensuring a form is active. This makes it possible for authenticated attackers, with subscriber-level access and above, to update their user meta to become an administrator.