Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total4
Critical0
High2
Medium2
Reset
Showing 1-4 of 4 records
Threat Entry Updated 2024-11-21

CVE-2024-10913 - Clone Plugin

The Clone plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.4.6 via deserialization of untrusted input in the 'recursive_unserialized_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

PLUGIN Clone

CVE-2024-10913

HIGH CVSS 8.8 2024-11-20
Threat Entry Updated 2024-11-21

CVE-2023-6750 - Clone Plugin

The Clone WordPress plugin before 2.4.3 uses buffer files to store in-progress backup informations, which is stored at a publicly accessible, statically defined file path.

PLUGIN Clone

CVE-2023-6750

HIGH CVSS 7.5 2024-01-08
Threat Entry Updated 2025-04-03

CVE-2023-3977 - Clone Plugin

Several plugins for WordPress by Inisev are vulnerable to Cross-Site Request Forgery to unauthorized installation of plugins due to a missing nonce check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for unauthenticated attackers to install plugins from the limited list via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Clone

CVE-2023-3977

MEDIUM CVSS 4.3 2023-07-28
Threat Entry Updated 2025-04-03

CVE-2023-0958 - Clone Plugin

Several plugins for WordPress by Inisev are vulnerable to unauthorized installation of plugins due to a missing capability check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for authenticated attackers with minimal permissions, such as subscribers, to install select plugins from Inisev on vulnerable sites. CVE-2023-38514 appears to be a duplicate of this vulnerability.

PLUGIN Clone

CVE-2023-0958

MEDIUM CVSS 4.3 2023-07-28
Scroll to top