Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3
Critical1
High2
Medium0
Reset
Showing 1-3 of 3 records
Threat Entry Updated 2025-06-03

CVE-2023-6600 - Omgf Plugin

The OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored Cross-Site Scripting due to a missing capability check on the update_settings() function hooked via admin_init in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin's settings which can be used to inject Cross-Site Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched.

PLUGIN Omgf

CVE-2023-6600

HIGH CVSS 8.6 2024-01-03
Threat Entry Updated 2024-11-21

CVE-2021-24638 - Omgf Plugin

The OMGF WordPress plugin before 4.5.4 does not escape or validate the handle parameter of the REST API, which allows unauthenticated users to perform path traversal and overwrite arbitrary CSS file with Google Fonts CSS, or download fonts uploaded on Google Fonts website.

PLUGIN Omgf

CVE-2021-24638

CRITICAL CVSS 9.1 2021-09-20
Threat Entry Updated 2024-11-21

CVE-2021-24639 - Omgf Plugin

The OMGF WordPress plugin before 4.5.4 does not enforce path validation, authorisation and CSRF checks in the omgf_ajax_empty_dir AJAX action, which allows any authenticated users to delete arbitrary files or folders on the server.

PLUGIN Omgf

CVE-2021-24639

HIGH CVSS 8.1 2021-09-20
Scroll to top