Filtered by vendor Wpchill
Subscribe
Total
26 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-4972 | 1 Wpchill | 1 Download Monitor | 2024-10-30 | N/A | 7.5 HIGH |
The Download Monitor plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several REST-API routes related to reporting in versions up to, and including, 4.7.51. This makes it possible for unauthenticated attackers to view user data and other sensitive information intended for administrators. | |||||
CVE-2023-6491 | 1 Wpchill | 1 Strong Testimonials | 2024-10-29 | N/A | 4.3 MEDIUM |
The Strong Testimonials plugin for WordPress is vulnerable to unauthorized modification of data due to an improper capability check on the wpmtst_save_view_sticky function in all versions up to, and including, 3.1.12. This makes it possible for authenticated attackers, with contributor access and above, to modify favorite views. | |||||
CVE-2020-8549 | 1 Wpchill | 1 Strong Testimonials | 2024-10-29 | 4.3 MEDIUM | 6.1 MEDIUM |
Stored XSS in the Strong Testimonials plugin before 2.40.1 for WordPress can result in an attacker performing malicious actions such as stealing session tokens. | |||||
CVE-2023-52123 | 1 Wpchill | 1 Strong Testimonials | 2024-10-29 | N/A | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) vulnerability in WPChill Strong Testimonials.This issue affects Strong Testimonials: from n/a through 3.1.10. | |||||
CVE-2024-8552 | 1 Wpchill | 1 Download Monitor | 2024-10-02 | N/A | 4.3 MEDIUM |
The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the enable_shop() function in all versions up to, and including, 5.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable shop functionality. | |||||
CVE-2022-27852 | 1 Wpchill | 1 Kb Support | 2024-09-16 | 4.3 MEDIUM | 6.1 MEDIUM |
Multiple Unauthenticated Stored Cross-Site Scripting (XSS) vulnerabilities in KB Support (WordPress plugin) <= 1.5.5 versions. | |||||
CVE-2021-23174 | 1 Wpchill | 1 Download Monitor | 2024-09-16 | 3.5 LOW | 4.8 MEDIUM |
Authenticated (admin+) Persistent Cross-Site Scripting (XSS) vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6) Vulnerable parameters: &post_title, &downloadable_file_version[0]. | |||||
CVE-2024-6571 | 1 Wpchill | 1 Optimize Images Alt Text \(alt Tag\) \& Names For Seo Using Ai | 2024-08-14 | N/A | 5.3 MEDIUM |
The Optimize Images ALT Text (alt tag) & names for SEO using AI plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.1.1. This is due the plugin utilizing cocur and not preventing direct access to the generate-default.php file. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. | |||||
CVE-2023-5704 | 1 Wpchill | 1 Cpo Shortcodes | 2024-02-05 | N/A | 5.4 MEDIUM |
The CPO Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 1.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |||||
CVE-2023-34007 | 1 Wpchill | 1 Download Monitor | 2024-02-05 | N/A | 8.8 HIGH |
Unrestricted Upload of File with Dangerous Type vulnerability in WPChill Download Monitor.This issue affects Download Monitor: from n/a through 4.8.3. | |||||
CVE-2023-25451 | 1 Wpchill | 1 Cpo Content Types | 2024-02-04 | N/A | 4.8 MEDIUM |
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPChill CPO Content Types plugin <= 1.1.0 versions. | |||||
CVE-2023-28171 | 1 Wpchill | 1 Brilliance | 2024-02-04 | N/A | 5.4 MEDIUM |
Auth. (subscriber+) Stored Cross-Site Scripting (XSS) vulnerability in WP Chill Brilliance theme <= 1.3.1 versions. | |||||
CVE-2022-41135 | 1 Wpchill | 1 Customizable Wordpress Gallery Plugin - Modula Image Gallery | 2024-02-04 | N/A | 5.3 MEDIUM |
Unauth. Plugin Settings Change vulnerability in Modula plugin <= 2.6.9 on WordPress. | |||||
CVE-2022-2222 | 1 Wpchill | 1 Download Monitor | 2024-02-04 | 4.0 MEDIUM | 4.9 MEDIUM |
The Download Monitor WordPress plugin before 4.5.91 does not ensure that files to be downloaded are inside the blog folders, and not sensitive, allowing high privilege users such as admin to download the wp-config.php or /etc/passwd even in an hardened environment or multisite setup. | |||||
CVE-2022-36292 | 1 Wpchill | 1 Gallery Photoblocks | 2024-02-04 | N/A | 8.8 HIGH |
Cross-Site Request Forgery (CSRF) vulnerabilities in WPChill Gallery PhotoBlocks plugin <= 1.2.6 at WordPress. | |||||
CVE-2022-37407 | 1 Wpchill | 1 Gallery Photoblocks | 2024-02-04 | N/A | 5.4 MEDIUM |
Multiple Authenticated Stored Cross-Site Scripting (XSS) vulnerabilities in WPChill Gallery PhotoBlocks plugin <= 1.2.6 at WordPress. | |||||
CVE-2022-2981 | 1 Wpchill | 1 Download Monitor | 2024-02-04 | N/A | 4.9 MEDIUM |
The Download Monitor WordPress plugin before 4.5.98 does not ensure that files to be downloaded are inside the blog folders, and not sensitive, allowing high privilege users such as admin to download the wp-config.php or /etc/passwd even in an hardened environment or multisite setup. | |||||
CVE-2021-24446 | 1 Wpchill | 1 Remove Footer Credit | 2024-02-04 | 6.0 MEDIUM | 5.4 MEDIUM |
The Remove Footer Credit WordPress plugin before 1.0.6 does not have CSRF check in place when saving its settings, which could allow attacker to make logged in admins change them and lead to Stored XSS issue as well due to the lack of sanitisation | |||||
CVE-2022-1054 | 1 Wpchill | 1 Rsvp And Event Management | 2024-02-04 | 5.0 MEDIUM | 5.3 MEDIUM |
The RSVP and Event Management Plugin WordPress plugin before 2.7.8 does not have any authorisation checks when exporting its entries, and has the export function hooked to the init action. As a result, unauthenticated attackers could call it and retrieve PII such as first name, last name and email address of user registered for events | |||||
CVE-2021-25050 | 1 Wpchill | 1 Remove Footer Credit | 2024-02-04 | 3.5 LOW | 4.8 MEDIUM |
The Remove Footer Credit WordPress plugin before 1.0.11 does properly sanitise its settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed. |