Filtered by vendor Wpulike
Subscriptions
Total
8 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-6792 | 2 Technowich, Wpulike | 2 Wp Ulike, Wp Ulike | 2025-04-11 | 3.5 Low |
The WP ULike WordPress plugin before 4.7.2.1 does not properly sanitize user display names when rendering on a public page. | ||||
CVE-2024-7879 | 2 Technowich, Wpulike | 2 Wp Ulike, Wp Ulike | 2025-04-11 | 4.8 Medium |
The WP ULike WordPress plugin before 4.7.5 does not sanitise and escape some of its settings, which could allow high privilege users such as editors to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed | ||||
CVE-2024-1797 | 1 Wpulike | 1 Wp Ulike | 2025-03-05 | 8.8 High |
The WP ULike – Most Advanced WordPress Marketing Toolkit plugin for WordPress is vulnerable to SQL Injection via the 'status' and 'id' attributes of the 'wp_ulike_counter' and 'wp_ulike' shortcodes in all versions up to, and including, 4.6.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | ||||
CVE-2024-1572 | 1 Wpulike | 1 Wp Ulike | 2025-03-05 | 6.4 Medium |
The WP ULike plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_ulike' shortcode in all versions up to, and including, 4.6.9 due to insufficient input sanitization and output escaping on the user supplied 'wrapper_class' attribute. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | ||||
CVE-2024-1759 | 1 Wpulike | 1 Wp Ulike | 2025-03-05 | 6.4 Medium |
The WP ULike – Most Advanced WordPress Marketing Toolkit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a user's display name in all versions up to, and including, 4.6.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | ||||
CVE-2018-1000511 | 1 Wpulike | 1 Ulike | 2024-11-21 | N/A |
WP ULike version 2.8.1, 3.1 contains a Incorrect Access Control vulnerability in AJAX that can result in allows anybody to delete any row in certain tables. This attack appear to be exploitable via Attacker must make AJAX request. This vulnerability appears to have been fixed in 3.2. | ||||
CVE-2018-1000508 | 1 Wpulike | 1 Ulike | 2024-11-21 | N/A |
WP ULike version 2.8.1, 3.1 contains a Cross Site Scripting (XSS) vulnerability in Settings screen that can result in allows unauthorised users to do almost anything an admin can. This attack appear to be exploitable via Admin must visit logs page. This vulnerability appears to have been fixed in 3.2. | ||||
CVE-2024-7878 | 2 Technowich, Wpulike | 2 Wp Ulike, Wp Ulike | 2024-10-02 | 4.8 Medium |
The WP ULike WordPress plugin before 4.7.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). |
Page 1 of 1.