6.4

CVSS3.1

CVE-2025-1503 - WP Recipe Maker <= 9.8.0 - Authenticated (Contributor+) Stored Cross-Site Scripting

The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Roundup Recipe Name field in all versions up to, and including, 9.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

πŸ“… Published: March 13, 2025, 4:21 a.m. πŸ”„ Last Modified: March 13, 2025, 4:21 a.m.

7.2

CVSS3.1

CVE-2025-1561 - AppPresser – Mobile App Framework <= 4.4.10 - Unauthenticated Stored Cross-Site Scripting

The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' parameter in all versions up to, and including, 4.4.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages when logging is enabled that will execute whenever a user accesses an injected page.

πŸ“… Published: March 13, 2025, 4:21 a.m. πŸ”„ Last Modified: March 13, 2025, 4:21 a.m.

4.3

CVSS3.1

CVE-2025-2104 - Page Builder: Pagelayer – Drag and Drop website builder <= 1.9.9 - Missing Authorization to Authent…

The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to unauthorized post publication due to insufficient validation on the pagelayer_save_content() function in all versions up to, and including, 1.9.8. This makes it possible for authenticated attackers, with Contributor-level access and above, to bypass post moderation and publish posts to the site.

πŸ“… Published: March 13, 2025, 4:21 a.m. πŸ”„ Last Modified: March 13, 2025, 4:21 a.m.

4.9

CVSS3.1

CVE-2025-2250 - WordPress Report Brute Force Attacks and Login Protection ReportAttacks Plugins <= 2.32 - Authentic…

The WordPress Report Brute Force Attacks and Login Protection ReportAttacks Plugins plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 2.32 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

πŸ“… Published: March 13, 2025, 3:21 a.m. πŸ”„ Last Modified: March 13, 2025, 4:15 a.m.

5.3

CVSS3.1

CVE-2024-13887 - Business Directory Plugin - Easy Listing Directories for WordPress <= 6.4.14 - Insecure Direct Obje…

The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.4.14 via the 'ajax_listing_submit_image_upload' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to add arbitrary images to listings.

πŸ“… Published: March 13, 2025, 3:21 a.m. πŸ”„ Last Modified: March 13, 2025, 4:15 a.m.

7.5

CVSS3.1

CVE-2025-2107 - Arielbrailovsky-Viralad <= 1.0.8 - Unauthenticated SQL Injection

The ArielBrailovsky-ViralAd plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter of the printResultAndDie() function in all versions up to, and including, 1.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only appears to be exploitable on very old versions of WordPress.

πŸ“… Published: March 13, 2025, 1:45 a.m. πŸ”„ Last Modified: March 13, 2025, 2:15 a.m.

4.3

CVSS3.1

CVE-2024-13703 - CRM and Lead Management by vcita <= 2.7.1 - Missing Authorization to Authenticated (Susbcriber+) Wi…

The CRM and Lead Management by vcita plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the vcita_ajax_toggle_ae() function in all versions up to, and including, 2.7.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable and disable plugin widgets.

πŸ“… Published: March 13, 2025, 1:45 a.m. πŸ”„ Last Modified: March 13, 2025, 2:15 a.m.

6.4

CVSS3.1

CVE-2025-1559 - CC-IMG-Shortcode <= 1.1.0 - Authenticated (Contributor+) Stored Cross-Site Scripting

The CC-IMG-Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'img' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

πŸ“… Published: March 13, 2025, 1:45 a.m. πŸ”„ Last Modified: March 13, 2025, 2:15 a.m.

7.5

CVSS3.1

CVE-2025-2106 - Arielbrailovsky-Viralad <= 1.0.8 - Unauthenticated SQL Injection

The ArielBrailovsky-ViralAd plugin for WordPress is vulnerable to SQL Injection via the 'text' and 'id' parameters of the limpia() function in all versions up to, and including, 1.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only appears to be exploitable on very old versions of WordPress.

πŸ“… Published: March 13, 2025, 1:45 a.m. πŸ”„ Last Modified: March 13, 2025, 2:15 a.m.

8.8

CVSS4.0

CVE-2025-25292 - Ruby SAML vulnerable to SAML authentication bypass due to namespace handling (parser differential)

ruby-saml provides security assertion markup language (SAML) single sign-on (SSO) for Ruby. An authentication bypass vulnerability was found in ruby-saml prior to versions 1.12.4 and 1.18.0 due to a parser differential. ReXML and Nokogiri parse XML differently, the parsers can generate entirely different document structures from the same XML input. That allows an attacker to be able to execute a Signature Wrapping attack. This issue may lead to authentication bypass. Versions 1.12.4 and 1.18.0 contain a patch for the issue.

πŸ“… Published: March 12, 2025, 8:53 p.m. πŸ”„ Last Modified: March 12, 2025, 10:15 p.m.
Total resulsts: 285129
Page 1 of 28,513
Β» next page
Filters