Filtered by vendor E-dynamics
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-28660 | 1 E-dynamics | 1 Events Made Easy | 2024-11-21 | N/A | 8.8 HIGH |
The Events Made Easy WordPress Plugin, version <= 2.3.14 is affected by an authenticated SQL injection vulnerability in the 'search_name' parameter in the eme_recurrences_list action. | |||||
CVE-2023-0404 | 1 E-dynamics | 1 Events Made Easy | 2024-11-21 | N/A | 5.4 MEDIUM |
The Events Made Easy plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several functions related to AJAX actions in versions up to, and including, 2.3.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke those functions intended for administrator use. While the plugin is still pending review from the WordPress repository, site owners can download a copy of the patched version directly from the developer's Github at https://github.com/liedekef/events-made-easy | |||||
CVE-2022-1905 | 1 E-dynamics | 1 Events Made Easy | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
The Events Made Easy WordPress plugin before 2.2.81 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection | |||||
CVE-2021-25030 | 1 E-dynamics | 1 Events Made Easy | 2024-11-21 | 6.5 MEDIUM | 8.8 HIGH |
The Events Made Easy WordPress plugin before 2.2.36 does not sanitise and escape the search_text parameter before using it in a SQL statement via the eme_searchmail AJAX action, available to any authenticated users. As a result, users with a role as low as subscriber can call it and perform SQL injection attacks | |||||
CVE-2021-24813 | 1 E-dynamics | 1 Events Made Easy | 2024-11-21 | 3.5 LOW | 4.8 MEDIUM |
The Events Made Easy WordPress plugin before 2.2.24 does not sanitise and escape Custom Field Names, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed |