Vulnerabilità WordPress (qui elenco plugin) fonte: NIST CVES
- CVE-2024-13834 -- 2025-02-15T15:15:23.423
Received- The Responsive Plus – Starter Templates, Advanced Features and Customizer Settings for Responsive Theme Plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.4 via the 'remote_request' function.
- This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. - CVE-2025-0822 -- 2025-02-15T13:15:28.847
Received- Bit Assist Plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the fileID Parameter.
- This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. - CVE-2024-13500 -- 2025-02-15T12:15:30.610
Received- The WP Project Manager – Task, team, and project management Plugin featuring kanban board and gantt charts Plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 2.6.17 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.
- This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - CVE-2024-13488 -- 2025-02-15T12:15:30.457
Received- The LTL Freight Quotes – Estes Edition Plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.3.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.
- This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - CVE-2024-13439 -- 2025-02-15T12:15:30.300
Received- The Team – Team Members Showcase Plugin Plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the response() function in all versions up to, and including, 4.4.9.
- This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the Plugin's settings. - CVE-2024-10581 -- 2025-02-15T12:15:28.900
Received- The DirectoryPress Frontend Plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.9.
- This is due to missing or incorrect nonce validation on the dpfl_listingStatusChange() function.
- This makes it possible for unauthenticated attackers to update listing statuses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. - CVE-2025-1005 -- 2025-02-15T10:15:08.740
Received- The ElementsKit Elementor addons Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Plugin's Image Accordion widget in all versions up to, and including, 3.4.0 due to insufficient input sanitization and output escaping on user supplied attributes.
- This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - CVE-2024-13752 -- 2025-02-15T10:15:08.533
Received- The WP Project Manager – Task, team, and project management Plugin featuring kanban board and gantt charts Plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check in the '/pm/v2/settings/notice' endpoint all versions up to, and including, 2.6.17.
- This makes it possible for authenticated attackers, with Subscriber-level access and above, to cause a persistent denial of service condition. - CVE-2024-12562 -- 2025-02-15T10:15:08.197
Received- The s2Member Pro Plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 241216 via deserialization of untrusted input from the 's2member_pro_remote_op' vulnerable parameter.
- This makes it possible for unauthenticated attackers to inject a PHP Object.
- No known POP chain is present in the vulnerable software.
- If a POP chain is present via an additional Plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. - CVE-2025-0935 -- 2025-02-15T09:15:10.583
Received- The Media Library Folders Plugin for WordPress is vulnerable to unauthorized Plugin settings change due to a missing capability check on several AJAX actions in all versions up to, and including, 8.3.0.
- This makes it possible for authenticated attackers, with Author-level access and above, to change Plugin settings related to things such as IP-blocking. - CVE-2024-13563 -- 2025-02-15T09:15:09.897
Received- The Front End Users Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Plugin's forgot-password shortcode in all versions up to, and including, 3.2.30 due to insufficient input sanitization and output escaping on user supplied attributes.
- This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - CVE-2024-13525 -- 2025-02-15T09:15:08.833
Received- The Customer email Verification for WooCommerce Plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.4 via shortcode.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including emails as well as hashed passwords of any user. - CVE-2024-13513 -- 2025-02-15T08:15:07.790
Received- The Oliver POS – A WooCommerce Point of Sale (POS) Plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4.2.3 via the logging functionality.
- This makes it possible for unauthenticated attackers to extract sensitive data including the Plugin's clientToken, which in turn can be used to change user account information including emails and account type.
- This allows attackers to then change account passwords resulting in a complete site takeover.
- Version 2.4.2.3 disabled logging but left sites with existing log files vulnerable. - CVE-2024-13306 -- 2025-02-15T06:15:36.847
Received- The Maps Plugin using Google Maps for WordPress WordPress Plugin before 1.9.4 does not sanitise and sanitise some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
- CVE-2024-13208 -- 2025-02-15T06:15:35.800
Received- The Maps Plugin using Google Maps for WordPress WordPress Plugin before 1.9.4 does not sanitise and sanitise some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
- CVE-2025-23657 -- 2025-02-14T13:15:45.760
Received- Improper Neutralization of Input During Web Page Generation ('Cross-Site Scripting') vulnerability in NotFound WordPress-to-candidate for Salesforce CRM allows Reflected XSS.
- This issue affects WordPress-to-candidate for Salesforce CRM: from n/a through 1.0.1. - CVE-2025-23492 -- 2025-02-14T13:15:43.573
Received- Improper Neutralization of Input During Web Page Generation ('Cross-Site Scripting') vulnerability in CantonBolo WordPress 淘宝客插件 allows Reflected XSS.
- This issue affects WordPress 淘宝客插件: from n/a through 1.1.2. - CVE-2025-23428 -- 2025-02-14T13:15:43.160
Received- Improper Neutralization of Input During Web Page Generation ('Cross-Site Scripting') vulnerability in NotFound QMean – WordPress Did You Mean allows Reflected XSS.
- This issue affects QMean – WordPress Did You Mean: from n/a through 2.0. - CVE-2025-0821 -- 2025-02-14T11:15:10.230
Received- Bit Assist Plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.
- This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. - CVE-2024-13791 -- 2025-02-14T11:15:09.320
Received- Bit Assist Plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the downloadResponseFile() function.
- This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. - CVE-2024-13735 -- 2025-02-14T10:15:09.207
Received- The HurryTimer – An Scarcity and Urgency Countdown Timer for WordPress & WooCommerce Plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.11.2 due to insufficient input sanitization and output escaping of a campaign name.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - CVE-2024-9601 -- 2025-02-14T07:15:32.570
Received- The Qubely – Advanced Gutenberg Blocks Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ and 'UniqueID' parameter in all versions up to, and including, 1.8.12 due to insufficient input sanitization and output escaping.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. - CVE-2024-7052 -- 2025-02-14T06:15:20.350
Received- The Forminator Forms WordPress Plugin before 1.38.3 does not sanitise and sanitise some of its settings, which could allow high privilege users such as Admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
- CVE-2024-13692 -- 2025-02-14T06:15:20.140
Received- The Return Refund and Exchange For WooCommerce – Return Management System, RMA Exchange, Wallet And Cancel Order Features Plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.4.5 via several functions due to missing validation on a user controlled key.
- This makes it possible for unauthenticated attackers to overwrite linked refund image attachments, overwrite refund request message, overwrite order messages, and read order messages of other users. - CVE-2024-13641 -- 2025-02-14T06:15:19.957
Received- The Return Refund and Exchange For WooCommerce – Return Management System, RMA Exchange, Wallet And Cancel Order Features Plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.4.5 via the 'attachment' directory.
- This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/attachment directory which can contain file attachments for order refunds. - CVE-2024-13493 -- 2025-02-14T06:15:19.740
Received- The Sensly Online Presence WordPress Plugin through 0.6 does not sanitise and sanitise some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
- CVE-2024-13182 -- 2025-02-13T13:15:08.290
Awaiting Analysis- The WP Directorybox Manager Plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.5.
- This is due to incorrect authentication in the 'wp_dp_parse_request' function.
- This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator. El complemento WP Directorybox Manager para WordPress es vulnerable a la omisión de autenticación en todas las versiones hasta la 2.5 incluida.
- Esto se debe a una autenticación incorrecta en la función 'wp_dp_parse_request'.
- Esto hace posible que atacantes no autenticados inicien sesión como cualquier usuario existente en el sitio, como un administrador. - CVE-2024-13867 -- 2025-02-13T10:15:09.847
Awaiting Analysis- The Listivo - Classified Ads WordPress Theme theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 2.3.67 due to insufficient input sanitization and output escaping.
- This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. El tema Listivo - Classified Ads WordPress Theme para WordPress es vulnerable a Cross-Site Scripting Reflected a través del parámetro 's' en todas las versiones hasta la 2.3.67 incluida, debido a una depuración de entrada y un sanitise de salida insuficientes.
- Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en páginas que se ejecutan si logran engañar a un usuario para que realice una acción como hacer clic en un enlace. - CVE-2024-13606 -- 2025-02-13T10:15:09.310
Awaiting Analysis- The JS Help Desk – The Ultimate Help Desk & Support Plugin Plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'jssupportticketdata' directory.
- This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads/jssupportticketdata directory which can contain file attachments included in support tickets. El complemento JS Help Desk – The Ultimate Help Desk & Support Plugin para WordPress es vulnerable a la exposición de información confidencial en todas las versiones hasta la 2.8.8 incluida a través del directorio 'jssupportticketdata'.
- Esto permite que atacantes no autenticados extraigan datos confidenciales almacenados de forma insegura en el directorio /wp-content/uploads/jssupportticketdata, que puede contener archivos adjuntos incluidos en los tickets de soporte. - CVE-2024-13639 -- 2025-02-13T09:15:07.273
Awaiting Analysis- The Read More & Accordion Plugin for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the expmdeleteData() function in all versions up to, and including, 3.4.2.
- This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary 'read more' posts. El complemento Read More & Accordion para WordPress es vulnerable a modificaciones no autorizadas y pérdida de datos debido a una falta de verificación de capacidad en la función expmdeleteData() en todas las versiones hasta la 3.4.2 incluida.
- Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen publicaciones arbitrarias de "leer más". - CVE-2025-0661 -- 2025-02-13T07:15:10.777
Awaiting Analysis- The DethemeKit For Elementor Plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the duplicate_post() function due to insufficient restrictions on which posts can be duplicated.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, draft, or scheduled posts that they should not have access to by duplicating the post. El complemento DethemeKit For Elementor para WordPress es vulnerable a la exposición de información en todas las versiones hasta la 2.36 incluida, a través de la función duplicate_post() debido a restricciones insuficientes sobre qué publicaciones se pueden duplicar.
- Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones protegidas con contraseña, privadas, en borrador o programadas a las que no deberían tener acceso duplicando la publicación. - CVE-2024-13346 -- 2025-02-13T07:15:09.760
Awaiting Analysis- The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 7.11.13.
- This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode.
- This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. El tema Avada | Website Builder For WordPress & WooCommerce para WordPress es vulnerable a la ejecución de códigos cortos arbitrarios en todas las versiones hasta 7.11.13 incluida.
- Esto se debe a que el software permite a los usuarios ejecutar una acción que no valida correctamente un valor antes de ejecutar do_shortcode.
- Esto hace posible que atacantes no autenticados ejecuten códigos cortos arbitrarios. - CVE-2024-13345 -- 2025-02-13T07:15:08.177
Awaiting Analysis- The Avada Builder Plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.11.13.
- This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode.
- This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. El complemento Avada Builder para WordPress es vulnerable a la ejecución arbitraria de códigos cortos en todas las versiones hasta la 3.11.13 incluida.
- Esto se debe a que el software permite a los usuarios ejecutar una acción que no valida correctamente un valor antes de ejecutar do_shortcode.
- Esto hace posible que atacantes no autenticados ejecuten códigos cortos arbitrarios. - CVE-2025-0692 -- 2025-02-13T06:15:21.353
Awaiting Analysis- The Simple Video Management System WordPress Plugin through 1.0.4 does not sanitise and sanitise some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). El complemento Simple Video Management System de WordPress hasta la versión 1.0.4 no depura ni escapa a algunas de sus configuraciones, lo que podría permitir que usuarios con altos privilegios como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo en una configuración multisitio).
- CVE-2024-13125 -- 2025-02-13T06:15:21.210
Awaiting Analysis- The Everest Forms WordPress Plugin before 3.0.8.1 does not sanitise and sanitise some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). El complemento Everest Forms para WordPress anterior a la versión 3.0.8.1 no depura ni escapa de algunas de sus configuraciones, lo que podría permitir que usuarios con privilegios elevados como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo en una configuración multisitio).
- CVE-2024-13121 -- 2025-02-13T06:15:21.050
Awaiting Analysis- The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content WordPress Plugin before 4.15.20 does not sanitise and sanitise some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). El complemento Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content de WordPress anterior a la versión 4.15.20 no depura ni escapa de algunas de sus configuraciones, lo que podría permitir que usuarios con privilegios altos como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración multisitio).
- CVE-2024-13120 -- 2025-02-13T06:15:20.917
Awaiting Analysis- The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content WordPress Plugin before 4.15.20 does not sanitise and sanitise some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). El complemento Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content de WordPress anterior a la versión 4.15.20 no depura ni escapa de algunas de sus configuraciones, lo que podría permitir que usuarios con privilegios altos como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración multisitio).
- CVE-2024-13119 -- 2025-02-13T06:15:20.763
Awaiting Analysis- The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content WordPress Plugin before 4.15.20 does not sanitise and sanitise some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). El complemento Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content de WordPress anterior a la versión 4.15.20 no depura ni escapa de algunas de sus configuraciones, lo que podría permitir que usuarios con privilegios altos como el administrador realicen ataques Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no está permitida (por ejemplo, en una configuración multisitio).
- CVE-2024-12586 -- 2025-02-13T06:15:20.607
Awaiting Analysis- The Chalet-Montagne.com Tools WordPress Plugin through 2.7.8 does not sanitise and sanitise a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. El complemento Chalet-Montagne.com Tools de WordPress hasta la versión 2.7.8 no depura ni escapa un parámetro antes de mostrarlo nuevamente en la página, lo que genera un Cross-Site Scripting Reflejado que podría usarse contra usuarios con privilegios altos, como el administrador.
- CVE-2025-0837 -- 2025-02-13T05:15:14.623
Awaiting Analysis- The Puzzles theme for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 4.2.4 due to insufficient input sanitization and output escaping on user supplied attributes.
- This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. El tema Puzzles para WordPress es vulnerable a Cross-Site Scripting Almacenado a través de códigos cortos en versiones hasta 4.2.4 incluida, debido a una depuración de entrada insuficiente y al sanitise de salida en los atributos proporcionados por el usuario.
- Esto hace posible que atacantes autenticados con permisos de nivel de colaborador y superiores inyecten scripts web arbitrarios en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. - CVE-2024-13770 -- 2025-02-13T05:15:14.177
Awaiting Analysis- The Puzzles | WP Magazine / Review with Store WordPress Theme + RTL theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.2.4 via deserialization of untrusted input 'view_more_posts' AJAX action.
- This makes it possible for unauthenticated attackers to inject a PHP Object.
- No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another Plugin or theme containing a POP chain is installed on the site.
- If a POP chain is present via an additional Plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.
- The developer opted to remove the software from the repository, so an update is not available and it is recommended to find a replacement software. El tema Puzzles | WP Magazine / Review with Store WordPress Theme + RTL para WordPress es vulnerable a la inyección de objetos PHP en todas las versiones hasta 4.2.4 incluida, a través de la deserialización de la acción AJAX 'view_more_posts' de entrada no confiable.
- Esto hace posible que atacantes no autenticados inyecten un objeto PHP.
- No hay ninguna cadena POP conocida presente en el software vulnerable, lo que significa que esta vulnerabilidad no tiene impacto a menos que se instale en el sitio otro complemento o tema que contenga una cadena POP.
- Si hay una cadena POP presente a través de un complemento o tema adicional instalado en el objetivo sistema, puede permitir al atacante realizar acciones como eliminar archivos arbitrarios, recuperar datos confidenciales o ejecutar código según la cadena POP presente.
- El desarrollador optó por eliminar el software del repositorio, por lo que no hay una actualización disponible y se recomienda encontrar un software de reemplazo. - CVE-2024-13229 -- 2025-02-13T05:15:13.930
Awaiting Analysis- The Rank Math SEO – AI SEO Tools to Dominate SEO Rankings Plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the update_metadata() function in all versions up to, and including, 1.0.235.
- This makes it possible for authenticated attackers, with Contributor-level access and above, to delete any schema metadata assigned to any post. El complemento Rank Math SEO – AI SEO Tools to Dominate SEO Rankings para WordPress es vulnerable a la pérdida no autorizada de datos debido a una verificación de capacidad faltante en la función update_metadata() en todas las versiones hasta la 1.0.235 incluida.
- Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, eliminen cualquier metadato de esquema asignado a cualquier publicación. - CVE-2024-13227 -- 2025-02-13T05:15:13.727
Awaiting Analysis- The Rank Math SEO – AI SEO Tools to Dominate SEO Rankings Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Plugin's Rank Math API in all versions up to, and including, 1.0.235 due to insufficient input sanitization and output escaping on user supplied attributes.
- This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. El complemento Rank Math SEO – AI SEO Tools to Dominate SEO Rankings para WordPress es vulnerable a Cross-Site Scripting Almacenado a través de la API Rank Math del complemento en todas las versiones hasta 1.0.235 incluida, debido a la entrada insuficiente desinfección y al sanitise de salida en los atributos proporcionados por el usuario.
- Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. - CVE-2024-10763 -- 2025-02-13T05:15:12.943
Awaiting Analysis- The Campress theme for WordPress is vulnerable to Local file Inclusion in all versions up to, and including, 1.35 via the 'campress_woocommerce_get_ajax_products' function.
- This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files.
- This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included. El tema Campress para WordPress es vulnerable a la inclusión de archivos locales en todas las versiones hasta la 1.35 incluida, a través de la función 'campress_woocommerce_get_ajax_products'.
- Esto permite que atacantes no autenticados incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecución de cualquier código PHP en esos archivos.
- Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecución de código en casos en los que se pueda cargar e incluir un tipo de archivo php. - CVE-2024-13644 -- 2025-02-13T02:15:29.320
Awaiting Analysis- The DethemeKit For Elementor Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Plugin's De Gallery widget in all versions up to, and including, 2.1.8 due to insufficient input sanitization and output escaping on user supplied attributes.
- This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. El complemento DethemeKit For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a través del widget De Gallery del complemento en todas las versiones hasta 2.1.8 incluida, debido a una depuración de entrada insuficiente y al sanitise de salida en los atributos proporcionados por el usuario.
- Esto hace posible que los atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en las páginas que se ejecutarán siempre que un usuario acceda a una página inyectada. - CVE-2024-10322 -- 2025-02-12T13:15:07.997
Awaiting Analysis- The Brizy – Page Builder Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via REST API SVG file uploads in all versions up to, and including, 2.6.8 due to insufficient input sanitization and output escaping.
- This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. El complemento Brizy – Page Builder para WordPress es vulnerable a Cross-Site Scripting Almacenado a través de las cargas de archivos SVG de la API REST en todas las versiones hasta 2.6.8 incluida, debido a una depuración de entrada insuficiente y al sanitise de salida insuficientes.
- Esto hace posible que los atacantes autenticados, con acceso de nivel de autor y superior, inyecten scripts web arbitraria en las páginas que se ejecutarán cada vez que un usuario acceda al archivo SVG. - CVE-2025-0511 -- 2025-02-12T12:15:29.210
Awaiting Analysis- The Welcart e-Commerce Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘name’ parameter in all versions up to, and including, 2.11.9 due to insufficient input sanitization and output escaping.
- This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. El complemento Welcart e-Commerce para WordPress es vulnerable a Cross-Site Scripting Almacenado a través del parámetro 'nombre' en todas las versiones hasta 2.11.9 incluida, debido a un sanitise de entrada desinfección y de salida insuficiente.
- Esto hace posible que atacantes no autenticados inyecten scripts web arbitraria en páginas que se ejecutarán cada vez que un usuario acceda a una página inyectada. - CVE-2024-13532 -- 2025-02-12T12:15:29.023
Awaiting Analysis- The Small Package Quotes – Purolator Edition Plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.
- This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. El complemento Small Package Quotes – Purolator Edition para WordPress es vulnerable a la inyección SQL a través de los parámetros 'edit_id' y 'dropship_edit_id' en todas las versiones hasta la 3.6.4 incluida, debido a un sanitise insuficiente en el parámetro proporcionado por el usuario y a la falta de preparación suficiente en la consulta SQL existente.
- Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer información confidencial de la base de datos. - CVE-2024-13480 -- 2025-02-12T12:15:28.840
Awaiting Analysis- The LTL Freight Quotes – For Customers of FedEx Freight Plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.4.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.
- This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. El complemento LTL Freight Quotes – For Customers of FedEx Freight para WordPress es vulnerable a la inyección SQL a través de los parámetros 'edit_id' y 'dropship_edit_id' en todas las versiones hasta la 3.4.1, y incluida, debido a un sanitise insuficiente en el parámetro proporcionado por el usuario y a la falta de preparación suficiente en la consulta SQL existente.
- Esto permite que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer información confidencial de la base de datos. - CVE-2024-13477 -- 2025-02-12T12:15:28.660
Awaiting Analysis- The LTL Freight Quotes – Unishippers Edition Plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' parameter in all versions up to, and including, 2.5.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.
- This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. El complemento LTL Freight Quotes – Unishippers Edition para WordPress es vulnerable a la inyección SQL a través del parámetro 'edit_id' en todas las versiones hasta la 2.5.8, y incluida, debido a un sanitise insuficiente en el parámetro proporcionado por el usuario y a la falta de preparación suficiente en la consulta SQL existente.
- Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer información confidencial de la base de datos.