Vulnerabilities (CVE)

Filtered by vendor Kibokolabs Subscribe
Filtered by product Watu Quiz
Total 6 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-2640 1 Kibokolabs 1 Watu Quiz 2024-08-01 N/A 5.4 MEDIUM
The Watu Quiz WordPress plugin before 3.4.1.2 does not sanitise and escape some of its settings, which could allow users such as authors (if they've been authorized by admins) to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
CVE-2015-10111 1 Kibokolabs 1 Watu Quiz 2024-05-17 6.5 MEDIUM 9.8 CRITICAL
A vulnerability was found in Watu Quiz Plugin up to 2.6.7 on WordPress. It has been rated as critical. This issue affects the function watu_exams of the file controllers/exam.php of the component Exam Handler. The manipulation of the argument quiz leads to sql injection. The attack may be initiated remotely. Upgrading to version 2.6.8 is able to address this issue. The name of the patch is bf42e7cfd819a3e76cf3e1465697e89f4830590c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230651.
CVE-2023-30483 1 Kibokolabs 1 Watu Quiz 2024-02-05 N/A 6.1 MEDIUM
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Kiboko Labs Watu Quiz plugin <= 3.3.9.2 versions.
CVE-2023-0428 1 Kibokolabs 1 Watu Quiz 2024-02-04 N/A 6.1 MEDIUM
The Watu Quiz WordPress plugin before 3.3.8.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CVE-2023-0429 1 Kibokolabs 1 Watu Quiz 2024-02-04 N/A 4.8 MEDIUM
The Watu Quiz WordPress plugin before 3.3.8.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
CVE-2023-0968 1 Kibokolabs 1 Watu Quiz 2024-02-04 N/A 6.1 MEDIUM
The Watu Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘dn’, 'email', 'points', and 'date' parameters in versions up to, and including, 3.3.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.