Filtered by vendor Wpchill
Subscriptions
Total
35 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2022-2981 | 1 Wpchill | 1 Download Monitor | 2024-11-21 | 4.9 Medium |
The Download Monitor WordPress plugin before 4.5.98 does not ensure that files to be downloaded are inside the blog folders, and not sensitive, allowing high privilege users such as admin to download the wp-config.php or /etc/passwd even in an hardened environment or multisite setup. | ||||
CVE-2022-2222 | 1 Wpchill | 1 Download Monitor | 2024-11-21 | 4.9 Medium |
The Download Monitor WordPress plugin before 4.5.91 does not ensure that files to be downloaded are inside the blog folders, and not sensitive, allowing high privilege users such as admin to download the wp-config.php or /etc/passwd even in an hardened environment or multisite setup. | ||||
CVE-2022-27852 | 1 Wpchill | 1 Kb Support | 2024-11-21 | 6.1 Medium |
Multiple Unauthenticated Stored Cross-Site Scripting (XSS) vulnerabilities in KB Support (WordPress plugin) <= 1.5.5 versions. | ||||
CVE-2022-1547 | 1 Wpchill | 1 Check \& Log Email | 2024-11-21 | 6.1 Medium |
The Check & Log Email WordPress plugin before 1.0.6 does not sanitise and escape a parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting | ||||
CVE-2022-1054 | 1 Wpchill | 1 Rsvp And Event Management | 2024-11-21 | 5.3 Medium |
The RSVP and Event Management Plugin WordPress plugin before 2.7.8 does not have any authorisation checks when exporting its entries, and has the export function hooked to the init action. As a result, unauthenticated attackers could call it and retrieve PII such as first name, last name and email address of user registered for events | ||||
CVE-2021-25050 | 1 Wpchill | 1 Remove Footer Credit | 2024-11-21 | 4.8 Medium |
The Remove Footer Credit WordPress plugin before 1.0.11 does properly sanitise its settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed. | ||||
CVE-2021-24908 | 1 Wpchill | 1 Check \& Log Email | 2024-11-21 | 6.1 Medium |
The Check & Log Email WordPress plugin before 1.0.4 does not escape the d parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting | ||||
CVE-2021-24786 | 1 Wpchill | 1 Download Monitor | 2024-11-21 | 7.2 High |
The Download Monitor WordPress plugin before 4.4.5 does not properly validate and escape the "orderby" GET parameter before using it in a SQL statement when viewing the logs, leading to an SQL Injection issue | ||||
CVE-2021-24774 | 1 Wpchill | 1 Check \& Log Email | 2024-11-21 | 7.2 High |
The Check & Log Email WordPress plugin before 1.0.3 does not validate and escape the "order" and "orderby" GET parameters before using them in a SQL statement when viewing logs, leading to SQL injections issues | ||||
CVE-2021-24446 | 1 Wpchill | 1 Remove Footer Credit | 2024-11-21 | 5.4 Medium |
The Remove Footer Credit WordPress plugin before 1.0.6 does not have CSRF check in place when saving its settings, which could allow attacker to make logged in admins change them and lead to Stored XSS issue as well due to the lack of sanitisation | ||||
CVE-2020-8549 | 1 Wpchill | 1 Strong Testimonials | 2024-11-21 | 6.1 Medium |
Stored XSS in the Strong Testimonials plugin before 2.40.1 for WordPress can result in an attacker performing malicious actions such as stealing session tokens. | ||||
CVE-2024-49256 | 1 Wpchill | 1 Htaccess File Editor | 2024-11-19 | 5.4 Medium |
Incorrect Authorization vulnerability in WPChill Htaccess File Editor allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Htaccess File Editor: from n/a through 1.0.18. | ||||
CVE-2024-47362 | 1 Wpchill | 1 Strong Testimonials | 2024-11-05 | 4.3 Medium |
Missing Authorization vulnerability in WPChill Strong Testimonials allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Strong Testimonials: from n/a through 3.1.16. | ||||
CVE-2022-4972 | 1 Wpchill | 1 Download Monitor | 2024-10-30 | 7.5 High |
The Download Monitor plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several REST-API routes related to reporting in versions up to, and including, 4.7.51. This makes it possible for unauthenticated attackers to view user data and other sensitive information intended for administrators. | ||||
CVE-2024-8552 | 1 Wpchill | 1 Download Monitor | 2024-10-02 | 4.3 Medium |
The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the enable_shop() function in all versions up to, and including, 5.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable shop functionality. |