Threat and Vulnerability Intelligence Database

RSS Feed

Example Searches:

CVE-2024-9636

Description: The Post Grid and Gutenberg Blocks plugin for WordPress is vulnerable to privilege escalation in versions 2.2.85 to 2.3.3. This is due to the plugin not properly restricting what user meta can be updated during profile registration. This makes it possible for unauthenticated attackers to register on the site as an administrator.

CVSS: CRITICAL (9.8)

EPSS Score: 0.06%

Source: CVE
January 16th, 2025 (3 months ago)

CVE-2024-12919

Description: The Paid Membership Subscriptions – Effortless Memberships, Recurring Payments & Content Restriction plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.13.7. This is due to the pms_pb_payment_redirect_link function using the user-controlled value supplied via the 'pms_payment_id' parameter to authenticate users without any further identity validation. This makes it possible for unauthenticated attackers with knowledge of a valid payment ID to log in as any user who has made a purchase on the targeted site.

CVSS: CRITICAL (9.8)

EPSS Score: 0.09%

Source: CVE
January 15th, 2025 (3 months ago)

CVE-2024-12877

Description: The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.19.2 via deserialization of untrusted input from the donation form like 'firstName'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files on the server that makes remote code execution possible. Please note this was only partially patched in 3.19.3, a fully sufficient patch was not released until 3.19.4. However, another CVE was assigned by another CNA for version 3.19.3 so we will leave this as affecting 3.19.2 and before. We have recommended the vendor use JSON encoding to prevent any further deserialization vulnerabilities from being present.

CVSS: CRITICAL (9.8)

EPSS Score: 0.07%

Source: CVE
January 12th, 2025 (3 months ago)

CVE-2025-22542

Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Ofek Nakar Virtual Bot allows Blind SQL Injection.This issue affects Virtual Bot: from n/a through 1.0.0.

CVSS: CRITICAL (9.3)

EPSS Score: 0.04%

Source: CVE
January 10th, 2025 (3 months ago)

CVE-2025-22540

Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Sebastian Orellana Emailing Subscription allows Blind SQL Injection.This issue affects Emailing Subscription: from n/a through 1.4.1.

CVSS: CRITICAL (9.3)

EPSS Score: 0.04%

Source: CVE
January 10th, 2025 (3 months ago)

CVE-2025-22504

Description: Unrestricted Upload of File with Dangerous Type vulnerability in jumpdemand 4ECPS Web Forms allows Upload a Web Shell to a Web Server.This issue affects 4ECPS Web Forms: from n/a through 0.2.18.

CVSS: CRITICAL (10.0)

EPSS Score: 0.04%

Source: CVE
January 10th, 2025 (3 months ago)

CVE-2024-11642

Description: The Post Grid Master – Custom Post Types, Taxonomies & Ajax Filter Everything with Infinite Scroll, Load More, Pagination & Shortcode Builder plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.4.12 via the 'locate_template' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The file included must have a .php extension.

CVSS: CRITICAL (9.8)

EPSS Score: 0.09%

Source: CVE
January 10th, 2025 (3 months ago)

CVE-2024-10215

Description: The WPBookit plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.6.4. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts.

CVSS: CRITICAL (9.8)

EPSS Score: 0.09%

Source: CVE
January 10th, 2025 (3 months ago)

CVE-2024-11635

Description: The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server.

CVSS: CRITICAL (9.8)

EPSS Score: 0.09%

Source: CVE
January 9th, 2025 (3 months ago)

CVE-2024-11613

Description: The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.

CVSS: CRITICAL (9.8)

EPSS Score: 0.15%

Source: CVE
January 9th, 2025 (3 months ago)