Vulnerabilities (CVE)

Filtered by vendor Benjaminrojas Subscribe
Filtered by product Wp Editor
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-24151 1 Benjaminrojas 1 Wp Editor 2024-11-21 N/A 7.2 HIGH
The WP Editor WordPress plugin before 1.2.7 did not sanitise or validate its setting fields leading to an authenticated (admin+) blind SQL injection issue via an arbitrary parameter when making a request to save the settings.
CVE-2016-10886 1 Benjaminrojas 1 Wp Editor 2024-11-21 7.5 HIGH 9.8 CRITICAL
The wp-editor plugin before 1.2.6 for WordPress has incorrect permissions.
CVE-2016-10885 1 Benjaminrojas 1 Wp Editor 2024-11-21 6.8 MEDIUM 8.8 HIGH
The wp-editor plugin before 1.2.6 for WordPress has CSRF.
CVE-2022-2446 1 Benjaminrojas 1 Wp Editor 2024-09-27 N/A 7.2 HIGH
The WP Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'current_theme_root' parameter in versions up to, and including 1.2.9. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.