Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-4314 | 1 Tms-outsource | 1 Wpdatatables | 2024-02-28 | N/A | 7.2 HIGH |
The wpDataTables WordPress plugin before 2.1.66 does not validate the "Serialized PHP array" input data before deserializing the data. This allows admins to deserialize arbitrary data which may lead to remote code execution if a suitable gadget chain is present on the server. This is impactful in environments where admin users should not be allowed to execute arbitrary code, such as multisite. | |||||
CVE-2023-23876 | 1 Tms-outsource | 1 Wpdatatables | 2024-02-28 | N/A | 5.4 MEDIUM |
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in TMS-Plugins wpDataTables plugin <= 2.1.49 versions. | |||||
CVE-2022-29432 | 1 Tms-outsource | 1 Wpdatatables | 2024-02-28 | 3.5 LOW | 4.8 MEDIUM |
Multiple Authenticated (administrator or higher user role) Persistent Cross-Site Scripting (XSS) vulnerabilities in TMS-Plugins wpDataTables plugin <= 2.1.27 on WordPress via &data-link-text, &data-link-url, &data, &data-shortcode, &data-star-num vulnerable parameters. | |||||
CVE-2021-24199 | 1 Tms-outsource | 1 Wpdatatables | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'start' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application. | |||||
CVE-2021-24197 | 1 Tms-outsource | 1 Wpdatatables | 2024-02-28 | 5.5 MEDIUM | 8.1 HIGH |
The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 has Improper Access Control. A low privilege authenticated user that visits the page where the table is published can tamper the parameters to access the data of another user that are present in the same table by taking over the user permissions on the table through formdata[wdt_ID] parameter. By exploiting this issue an attacker is able to access and manage the data of all users in the same table. | |||||
CVE-2021-24198 | 1 Tms-outsource | 1 Wpdatatables | 2024-02-28 | 5.5 MEDIUM | 8.1 HIGH |
The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 has Improper Access Control. A low privilege authenticated user that visits the page where the table is published can tamper the parameters to delete the data of another user that are present in the same table through id_key and id_val parameters. By exploiting this issue an attacker is able to delete the data of all users in the same table. | |||||
CVE-2021-24200 | 1 Tms-outsource | 1 Wpdatatables | 2024-02-28 | 4.0 MEDIUM | 6.5 MEDIUM |
The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'length' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application. |