Filtered by vendor Iqonic
Subscribe
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-41128 | 1 Iqonic | 1 Wp Roadmap | 2024-02-28 | N/A | 4.8 MEDIUM |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Iqonic Design WP Roadmap – Product Feedback Board allows Stored XSS.This issue affects WP Roadmap – Product Feedback Board: from n/a through 1.0.8. | |||||
CVE-2023-2627 | 1 Iqonic | 1 Kivicare | 2024-02-28 | N/A | 4.3 MEDIUM |
The KiviCare WordPress plugin before 3.2.1 does not have proper CSRF and authorisation checks in various AJAX actions, allowing any authenticated users, such as subscriber to call them. Attacks include but are not limited to: Add arbitrary Clinic Admin/Doctors/etc and update plugin's settings | |||||
CVE-2023-2624 | 1 Iqonic | 1 Kivicare | 2024-02-28 | N/A | 6.1 MEDIUM |
The KiviCare WordPress plugin before 3.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrator | |||||
CVE-2023-2628 | 1 Iqonic | 1 Kivicare | 2024-02-28 | N/A | 8.8 HIGH |
The KiviCare WordPress plugin before 3.2.1 does not have CSRF checks (either flawed or missing completely) in various AJAX actions, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks. This includes, but is not limited to: Delete arbitrary appointments/medical records/etc, create/update various users (patients, doctors etc) | |||||
CVE-2023-2623 | 1 Iqonic | 1 Kivicare | 2024-02-28 | N/A | 6.5 MEDIUM |
The KiviCare WordPress plugin before 3.2.1 does not restrict the information returned in a response and returns all user data, allowing low privilege users such as subscriber to retrieve sensitive information such as the user email and hashed password of other users | |||||
CVE-2022-0786 | 1 Iqonic | 1 Kivicare | 2024-02-28 | 7.5 HIGH | 9.8 CRITICAL |
The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to SQL Injections exploitable by unauthenticated users |