Security
Headlines
HeadlinesLatestCVEs

Tag

#wordpress

CVE-2022-4307

The ?????? ?????? ?????? WordPress plugin before 2.9.3 does not sanitise and escape some parameters, allowing unauthenticated attackers to send a request with XSS payloads, which will be triggered when a high privilege users such as admin visits a page from the plugin.

CVE
#xss#wordpress#auth
Database Malware Strikes Hundreds of Vulnerable WordPress Sites

By Deeba Ahmed The database injection against WordPress websites features two different malware embedded together to achieve two entirely different goals. This is a post from HackRead.com Read the original post: Database Malware Strikes Hundreds of Vulnerable WordPress Sites

CVE-2023-23492: Cross-Site Scripting vulnerabilities in Multiple WordPress Plugins

The Login with Phone Number WordPress Plugin, version < 1.4.2, is affected by an authenticated SQL injection vulnerability in the 'ID' parameter of its 'lwp_forgot_password' action.

CVE-2023-23490: SQL Injection in Multiple WordPress Plugins

The Survey Maker WordPress Plugin, version < 3.1.2, is affected by an authenticated SQL injection vulnerability in the 'surveys_ids' parameter of its 'ays_surveys_export_json' action.

Mailchimp breach feels like deja vu

Categories: News Tags: Mailchimp Tags: social engineering Tags: targete attack Email marketing provider Mailchimp has been breached again, nine months after it was compromised last year. (Read more...) The post Mailchimp breach feels like deja vu appeared first on Malwarebytes Labs.

CVE-2022-40697: WordPress 3com – Asesor de Cookies plugin <= 3.4.3 - Auth. Stored Cross-Site Scripting (XSS) vulnerability - Patchstack

Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in 3com – Asesor de Cookies para normativa española plugin <= 3.4.3 versions.

CVE-2023-0403: SWP_Options_Page.php in social-warfare/trunk/lib/options – WordPress Plugin Repository

The Social Warfare plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.4.0. This is due to missing or incorrect nonce validation on several AJAX actions. This makes it possible for unauthenticated attackers to delete post meta information and reset network access tokens, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2023-0404: Changeset 2836308 for events-made-easy – WordPress Plugin Repository

The Events Made Easy plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several functions related to AJAX actions in versions up to, and including, 2.3.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke those functions intended for administrator use. While the plugin is still pending review from the WordPress repository, site owners can download a copy of the patched version directly from the developer's Github at https://github.com/liedekef/events-made-easy

CVE-2023-0402: Changeset 2844092 for social-warfare – WordPress Plugin Repository

The Social Warfare plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several AJAX actions in versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete post meta information and reset network access tokens.

CVE-2023-0385: AdminClass.php in custom-404-pro/tags/3.7.1/admin – WordPress Plugin Repository

The Custom 404 Pro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.7.1. This is due to missing or incorrect nonce validation on the custom_404_pro_admin_init function. This makes it possible for unauthenticated attackers to delete logs, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.