Filtered by vendor Wpkube
Subscribe
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-3228 | 1 Wpkube | 1 Kiwi Social Share | 2024-11-21 | N/A | 5.3 MEDIUM |
The Social Sharing Plugin – Kiwi plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.1.7 via the 'kiwi-nw-pinterest' class. This makes it possible for unauthenticated attackers to view limited content from password protected posts. | |||||
CVE-2023-37981 | 1 Wpkube | 1 Authors List | 2024-11-21 | N/A | 7.1 HIGH |
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPKube Authors List plugin <= 2.0.2 versions. | |||||
CVE-2022-29414 | 1 Wpkube | 1 Subscribe To Comments Reloaded | 2024-11-21 | 5.8 MEDIUM | 5.4 MEDIUM |
Multiple (13x) Cross-Site Request Forgery (CSRF) vulnerabilities in WPKube's Subscribe To Comments Reloaded plugin <= 211130 on WordPress allows attackers to clean up Log archive, download system info file, plugin system settings, plugin options settings, generate a new key, reset all options, change notifications settings, management page settings, comment form settings, manage subscriptions > mass update settings, manage subscriptions > add a new subscription, update subscription, delete Subscription. | |||||
CVE-2021-4362 | 1 Wpkube | 1 Kiwi Social Share | 2024-11-21 | N/A | 9.8 CRITICAL |
The Kiwi Social Share plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the kiwi_social_share_get_option() function called via the kiwi_social_share_get_option AJAX action in version 2.1.0. This makes it possible for unauthenticated attackers to read and modify arbitrary options on a WordPress site that can be used for complete site takeover. This was a previously fixed vulnerability that was reintroduced in this version. | |||||
CVE-2021-24745 | 1 Wpkube | 1 About Author Box | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
The About Author Box WordPress plugin before 1.0.2 does not sanitise and escape the Social Profiles field values before outputting them in attributes, which could allow user with a role as low as contributor to perform Cross-Site Scripting attacks. | |||||
CVE-2021-24682 | 1 Wpkube | 1 Cool Tag Cloud | 2024-11-21 | 3.5 LOW | 5.4 MEDIUM |
The Cool Tag Cloud WordPress plugin before 2.26 does not escape the style attribute of the cool_tag_cloud shortcode, which could allow users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks. |