Security
Headlines
HeadlinesLatestCVEs

Tag

#intel

CVE-2020-36709: Page Builder: KingComposer < 2.9.4 - Stored Cross-Site Scripting — Wordfence Intelligence

The Page Builder: KingComposer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via via shortcode in versions before 2.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE
#xss#vulnerability#web#wordpress#intel#perl#auth
CVE-2020-36710: WPS Hide Login <= 1.5.4.2 - Hidden Login Page Location Disclosure — Wordfence Intelligence

The WPS Hide Login plugin for WordPress is vulnerable to login page disclosure even when the settings of the plugin are set to hide the login page making it possible for unauthenticated attackers to brute force credentials on sites in versions up to, and including, 1.5.4.2.

CVE-2020-36712: Kali Forms <= 2.1.1 - Unauthenticated Arbitrary Post Deletion — Wordfence Intelligence

The Kali Forms plugin for WordPress is vulnerable to Unauthenticated Arbitrary Post Deletion in versions up to, and including, 2.1.1. This is due to the kaliforms_form_delete_uploaded_file function lacking any privilege or user protections. This makes it possible for unauthenticated attackers to delete any site post or page with the id parameter.

CVE-2021-4342: Various Affected Software (Various Versions) - Cross-Site Request Forgery Bypass — Wordfence Intelligence

Over 70 plugins and themes were vulnerable to Cross-Site Request Forgery due to improperly implemented nonce protection that could be bypassed.

CVE-2022-4950: Cool Plugins (Various Versions) - Arbitrary Plugin Installation and Activation — Wordfence Intelligence

Several WordPress plugins developed by Cool Plugins are vulnerable to arbitrary plugin installation and activation that can lead to remote code execution by authenticated attackers with minimal permissions, such as a subscriber.

CVE-2021-4383: WP Quick FrontEnd Editor <= 5.5 - Authenticated (Subscriber+) Content Injection — Wordfence Intelligence

The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to page content injection in versions up to, and including, 5.5. This is due to missing capability checks in the plugin's page-editing functionality. This makes it possible for low-authenticated attackers, such as subscribers, to edit/create any page or post on the blog.

CVE-2021-4366: PWA for WP & AMP < = 1.7.32 - Missing Authorization — Wordfence Intelligence

The PWA for WP & AMP plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the pwaforwp_update_features_options function in versions up to, and including, 1.7.32. This makes it possible for authenticated attackers to change the otherwise restricted settings within the plugin.

CVE-2021-4348: Ultimate GDPR & CCPA <= 2.4 - Unauthenticated Settings Import & Export — Wordfence Intelligence

The Ultimate GDPR & CCPA plugin for WordPress is vulnerable to unauthenticated settings import and export via the export_settings & import_settings functions in versions up to, and including, 2.4. This makes it possible for unauthenticated attackers to change plugin settings and conduct attacks such as redirecting visitors to malicious sites.

CVE-2019-25147: Pretty Links <= 2.1.9 - Unauthenticated Stored Cross-Site Scripting via track_link — Wordfence Intelligence

The Pretty Links plugin for WordPress is vulnerable to Stored Cross-Site Scripting via various IP headers as well as the referer header in versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping in the track_link function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE-2020-36731: Flexible Checkout Fields for WooCommerce <= 2.3.1 - Unauthenticated Arbitrary Plugin Settings Update — Wordfence Intelligence

The Flexible Checkout Fields for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Plugin Settings update, in addition to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to missing authorization checks on the updateSettingsAction() function which is called via an admin_init hook, along with missing sanitization and escaping on the settings that are stored.