Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total4
Critical0
High3
Medium1
Reset
Showing 1-4 of 4 records
Threat Entry Updated 2024-11-21

CVE-2023-2549 - Page Plugin

The Feather Login Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions starting from 1.0.7 up to, and including, 1.1.1. This is due to missing nonce validation in the 'createTempAccountLink' function. This makes it possible for unauthenticated attackers to create a new user with administrator role via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can leverage CVE-2023-2545 to get the login link or request a password reset to the new user's email…

PLUGIN Page

CVE-2023-2549

HIGH CVSS 8.8 2023-05-31
Threat Entry Updated 2024-11-21

CVE-2023-2545 - Page Plugin

The Feather Login Page plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'getListOfUsers' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to access the login links, which can be used for privilege escalation.

PLUGIN Page

CVE-2023-2545

HIGH CVSS 8.1 2023-05-31
Threat Entry Updated 2024-11-21

CVE-2023-2547 - Page Plugin

The Feather Login Page plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteUser' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the temp user generated by the plugin.

PLUGIN Page

CVE-2023-2547

MEDIUM CVSS 5.4 2023-05-31
Threat Entry Updated 2024-11-21

CVE-2021-24460 - Page Plugin

The get_fb_likeboxes() function in the Popup Like box – Page Plugin WordPress plugin before 3.5.3 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard

PLUGIN Page

CVE-2021-24460

HIGH CVSS 8.8 2021-08-02
Scroll to top