Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-24151 | 1 Benjaminrojas | 1 Wp Editor | 2024-11-21 | N/A | 7.2 HIGH |
The WP Editor WordPress plugin before 1.2.7 did not sanitise or validate its setting fields leading to an authenticated (admin+) blind SQL injection issue via an arbitrary parameter when making a request to save the settings. | |||||
CVE-2016-10886 | 1 Benjaminrojas | 1 Wp Editor | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The wp-editor plugin before 1.2.6 for WordPress has incorrect permissions. | |||||
CVE-2016-10885 | 1 Benjaminrojas | 1 Wp Editor | 2024-11-21 | 6.8 MEDIUM | 8.8 HIGH |
The wp-editor plugin before 1.2.6 for WordPress has CSRF. | |||||
CVE-2022-2446 | 1 Benjaminrojas | 1 Wp Editor | 2024-09-27 | N/A | 7.2 HIGH |
The WP Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'current_theme_root' parameter in versions up to, and including 1.2.9. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload. |