Show filters
47 Total Results
Displaying 1-10 of 47
Sort by:
Attacker Value
Unknown

CVE-2025-24683

Disclosure Date: January 24, 2025 (last updated January 25, 2025)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPChill RSVP and Event Management Plugin allows SQL Injection. This issue affects RSVP and Event Management Plugin: from n/a through 2.7.14.
0
Attacker Value
Unknown

CVE-2025-22773

Disclosure Date: January 15, 2025 (last updated January 16, 2025)
Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19.
0
Attacker Value
Unknown

CVE-2024-12853

Disclosure Date: January 08, 2025 (last updated January 09, 2025)
The Modula Image Gallery plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the zip upload functionality in all versions up to, and including, 2.11.10. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Attacker Value
Unknown

CVE-2024-12711

Disclosure Date: January 07, 2025 (last updated January 08, 2025)
The RSVP and Event Management plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several AJAX functions like bulk_delete_attendees() and bulk_delete_questions() in all versions up to, and including, 2.7.13. This makes it possible for unauthenticated attackers to delete questions and attendees and for authenticated users to update question menu orders.
Attacker Value
Unknown

CVE-2024-11282

Disclosure Date: January 07, 2025 (last updated January 07, 2025)
The Passster – Password Protect Pages and Content plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.10 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
Attacker Value
Unknown

CVE-2024-11106

Disclosure Date: December 10, 2024 (last updated December 21, 2024)
The Simple Restrict plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.7 via the WordPress core search feature. This makes it possible for unauthenticated attackers to extract sensitive data from posts that have been restricted to higher-level roles such as administrator.
0
Attacker Value
Unknown

CVE-2024-49256

Disclosure Date: November 01, 2024 (last updated November 19, 2024)
Incorrect Authorization vulnerability in WPChill Htaccess File Editor allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Htaccess File Editor: from n/a through 1.0.18.
Attacker Value
Unknown

CVE-2024-47362

Disclosure Date: November 01, 2024 (last updated November 06, 2024)
Missing Authorization vulnerability in WPChill Strong Testimonials allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Strong Testimonials: from n/a through 3.1.16.
Attacker Value
Unknown

CVE-2024-10399

Disclosure Date: October 30, 2024 (last updated October 30, 2024)
The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_search_users function in all versions up to, and including, 5.0.13. This makes it possible for authenticated attackers, with Subscriber-level access and above, to obtain usernames and emails of site users.
Attacker Value
Unknown

CVE-2024-10092

Disclosure Date: October 26, 2024 (last updated October 26, 2024)
The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_handle_api_key_actions function in all versions up to, and including, 5.0.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to revoke existing API keys and generate new ones.