Filtered by vendor Azexo
Subscribe
Filtered by product Page Builder With Image Map By Azexo
Subscribe
Total
4 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-3055 | 1 Azexo | 1 Page Builder With Image Map By Azexo | 2024-11-21 | N/A | 6.1 MEDIUM |
The Page Builder by AZEXO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.27.133. This is due to missing or incorrect nonce validation on the 'azh_save' function. This makes it possible for unauthenticated attackers to update the post content and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. | |||||
CVE-2023-3053 | 1 Azexo | 1 Page Builder With Image Map By Azexo | 2024-11-21 | N/A | 5.4 MEDIUM |
The Page Builder by AZEXO plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'azh_add_post' function in versions up to, and including, 1.27.133. This makes it possible for authenticated attackers to create a post with any post type and post status. | |||||
CVE-2023-3052 | 1 Azexo | 1 Page Builder With Image Map By Azexo | 2024-11-21 | N/A | 6.3 MEDIUM |
The Page Builder by AZEXO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.27.133. This is due to missing or incorrect nonce validation on the 'azh_add_post', 'azh_duplicate_post', 'azh_update_post' and 'azh_remove_post' functions. This makes it possible for unauthenticated attackers to create, modify, and delete a post via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | |||||
CVE-2023-3051 | 1 Azexo | 1 Page Builder With Image Map By Azexo | 2024-11-21 | N/A | 6.4 MEDIUM |
The Page Builder by AZEXO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'azh_post' shortcode in versions up to, and including, 1.27.133 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |