CVE-2025-0952 |
Description: The Eco Nature - Environment & Ecology WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' AJAX action in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration.
CVSS: HIGH (8.1) EPSS Score: 0.03%
March 14th, 2025 (4 months ago)
|
CVE-2024-13913 |
Description: The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.1.0.83. This is due to missing or incorrect nonce validation in the '/migrate/templates/main.php' file. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
CVSS: HIGH (8.8) EPSS Score: 0.04%
March 14th, 2025 (4 months ago)
|
CVE-2024-13376 |
Description: The Industrial theme for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the _ajax_get_total_content_import_items() function in all versions up to, and including, 1.7.8. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
CVSS: HIGH (8.8) EPSS Score: 0.04%
March 14th, 2025 (4 months ago)
|
CVE-2025-2056 |
Description: The WP Ghost (Hide My WP Ghost) – Security & Firewall plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 5.4.01 via the showFile function. This makes it possible for unauthenticated attackers to read the contents of specific file types on the server, which can contain sensitive information.
CVSS: HIGH (7.5) EPSS Score: 0.12%
March 14th, 2025 (4 months ago)
|
CVE-2024-11283 |
Description: The WP JobHunt plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 7.1. This is due to wp_ajax_google_api_login_callback function not properly verifying a user's identity prior to authenticating them. This makes it possible for unauthenticated attackers to access arbitrary candidate accounts.
CVSS: HIGH (7.5) EPSS Score: 0.1%
March 14th, 2025 (4 months ago)
|
CVE-2025-24855 |
Description: numbers.c in libxslt before 1.1.43 has a use-after-free because, in nested XPath evaluations, an XPath context node can be modified but never restored. This is related to xsltNumberFormatGetValue, xsltEvalXPathPredicate, xsltEvalXPathStringNs, and xsltComputeSortResultInternal.
CVSS: HIGH (7.8) EPSS Score: 0.01%
March 14th, 2025 (4 months ago)
|
CVE-2024-55549 |
Description: xsltGetInheritedNsList in libxslt before 1.1.43 has a use-after-free issue related to exclusion of result prefixes.
CVSS: HIGH (7.8) EPSS Score: 0.01%
March 14th, 2025 (4 months ago)
|
CVE-2024-36305 |
Description: A security agent link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVSS: HIGH (7.8) EPSS Score: 0.12% SSVC Exploitation: none
March 14th, 2025 (4 months ago)
|
CVE-2024-2301 |
Description: Certain HP LaserJet Pro devices are potentially vulnerable to a Cross-Site Scripting (XSS) attack via the web management interface of the device.
CVSS: HIGH (7.6) EPSS Score: 0.22% SSVC Exploitation: none
March 14th, 2025 (4 months ago)
|
CVE-2025-2230 |
Description: A flaw exists in the Windows login flow where an AuthContext token can
be exploited for replay attacks and authentication bypass.
CVSS: HIGH (7.7) EPSS Score: 0.03%
March 13th, 2025 (4 months ago)
|