Show filters
56 Total Results
Displaying 51-56 of 56
Sort by:
Attacker Value
Unknown

CVE-2022-4063

Disclosure Date: December 19, 2022 (last updated October 08, 2023)
The InPost Gallery WordPress plugin before 2.1.4.1 insecurely uses PHP's extract() function when rendering HTML views, allowing attackers to force the inclusion of malicious files & URLs, which may enable them to run code on servers.
Attacker Value
Unknown

CVE-2022-1916

Disclosure Date: June 27, 2022 (last updated February 24, 2025)
The Active Products Tables for WooCommerce. Professional products tables for WooCommerce store WordPress plugin before 1.0.5 does not sanitise and escape a parameter before outputting it back in the response of an AJAX action (available to both unauthenticated and authenticated users), leading to a Reflected cross-Site Scripting
Attacker Value
Unknown

CVE-2022-0234

Disclosure Date: February 21, 2022 (last updated February 23, 2025)
The WOOCS WordPress plugin before 1.3.7.5 does not sanitise and escape the woocs_in_order_currency parameter of the woocs_get_products_price_html AJAX action (available to both unauthenticated and authenticated users) before outputting it back in the response, leading to a Reflected Cross-Site Scripting
Attacker Value
Unknown

CVE-2021-25085

Disclosure Date: February 01, 2022 (last updated February 23, 2025)
The WOOF WordPress plugin before 1.2.6.3 does not sanitise and escape the woof_redraw_elements before outputing back in an admin page, leading to a Reflected Cross-Site Scripting
Attacker Value
Unknown

CVE-2021-25043

Disclosure Date: January 10, 2022 (last updated February 23, 2025)
The WOOCS WordPress plugin before 1.3.7.3 does not sanitise and escape the custom_prices parameter before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue
Attacker Value
Unknown

CVE-2021-20781

Disclosure Date: July 14, 2021 (last updated February 23, 2025)
Cross-site request forgery (CSRF) vulnerability in WordPress Meta Data Filter & Taxonomies Filter versions prior to v.1.2.8 and versions prior to v.2.2.8 allows remote attackers to hijack the authentication of administrators via unspecified vectors.