Vulnerabilities (CVE)

Filtered by vendor Wpcharitable Subscribe
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-4404 1 Wpcharitable 1 Charitable 2024-11-21 N/A 9.8 CRITICAL
The Donation Forms by Charitable plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.7.0.12 due to insufficient restriction on the 'update_core_user' function. This makes it possible for unauthenticated attackers to specify their user role by supplying the 'role' parameter during a registration.
CVE-2023-47816 1 Wpcharitable 1 Charitable 2024-11-21 N/A 6.5 MEDIUM
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Charitable Donations & Fundraising Team Donation Forms by Charitable plugin <= 1.7.0.13 versions.
CVE-2022-47441 1 Wpcharitable 1 Charitable 2024-11-21 N/A 7.1 HIGH
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Charitable Donations & Fundraising Team Donation Forms by Charitable plugin <= 1.7.0.10 versions.
CVE-2021-24531 1 Wpcharitable 1 Charitable 2024-11-21 3.5 LOW 5.4 MEDIUM
The Charitable – Donation Plugin WordPress plugin before 1.6.51 is affected by an authenticated stored cross-site scripting vulnerability which was found in the add donation feature.
CVE-2018-21011 1 Wpcharitable 1 Charitable 2024-11-21 5.0 MEDIUM 7.5 HIGH
The charitable plugin before 1.5.14 for WordPress has unauthorized access to user and donation details.
CVE-2024-8791 1 Wpcharitable 1 Charitable 2024-09-26 N/A 9.8 CRITICAL
The Donation Forms by Charitable – Donations Plugin & Fundraising Platform for WordPress plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.8.1.14. This is due to the plugin not properly verifying a user's identity when the ID parameter is supplied through the update_core_user() function. This makes it possible for unauthenticated attackers to update the email address and password of arbitrary user accounts, including administrators, which can then be used to log in to those user accounts.