Vulnerabilities (CVE)

Filtered by vendor E-dynamics Subscribe
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-28660 1 E-dynamics 1 Events Made Easy 2024-11-21 N/A 8.8 HIGH
The Events Made Easy WordPress Plugin, version <= 2.3.14 is affected by an authenticated SQL injection vulnerability in the 'search_name' parameter in the eme_recurrences_list action.
CVE-2023-0404 1 E-dynamics 1 Events Made Easy 2024-11-21 N/A 5.4 MEDIUM
The Events Made Easy plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several functions related to AJAX actions in versions up to, and including, 2.3.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke those functions intended for administrator use. While the plugin is still pending review from the WordPress repository, site owners can download a copy of the patched version directly from the developer's Github at https://github.com/liedekef/events-made-easy
CVE-2022-1905 1 E-dynamics 1 Events Made Easy 2024-11-21 7.5 HIGH 9.8 CRITICAL
The Events Made Easy WordPress plugin before 2.2.81 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
CVE-2021-25030 1 E-dynamics 1 Events Made Easy 2024-11-21 6.5 MEDIUM 8.8 HIGH
The Events Made Easy WordPress plugin before 2.2.36 does not sanitise and escape the search_text parameter before using it in a SQL statement via the eme_searchmail AJAX action, available to any authenticated users. As a result, users with a role as low as subscriber can call it and perform SQL injection attacks
CVE-2021-24813 1 E-dynamics 1 Events Made Easy 2024-11-21 3.5 LOW 4.8 MEDIUM
The Events Made Easy WordPress plugin before 2.2.24 does not sanitise and escape Custom Field Names, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed