Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total922
Critical922
High0
Medium0
Reset
Showing 901-920 of 922 records
Threat Entry Updated 2024-11-21

CVE-2021-24376 - Before 2 Plugin

The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed from the disk. It is a bypass of CVE-2020-24948 which allows sending a PHP file via the "Import Settings" functionality to achieve Remote Code Execution.

PLUGIN Before 2

CVE-2021-24376

CRITICAL CVSS 9.8 2021-06-21
Threat Entry Updated 2024-11-21

CVE-2021-24361 - In The Location Manager Plugin

In the Location Manager WordPress plugin before 2.1.0.10, the AJAX action gd_popular_location_list did not properly sanitise or validate some of its POST parameters, which are then used in a SQL statement, leading to unauthenticated SQL Injection issues.

PLUGIN In The Location Manager

CVE-2021-24361

CRITICAL CVSS 9.8 2021-06-21
Threat Entry Updated 2024-11-21

CVE-2021-29504 - Wp Cli Plugin

WP-CLI is the command-line interface for WordPress. An improper error handling in HTTPS requests management in WP-CLI version 0.12.0 and later allows remote attackers able to intercept the communication to remotely disable the certificate verification on WP-CLI side, gaining full control over the communication content, including the ability to impersonate update servers and push malicious updates towards WordPress instances controlled by the vulnerable WP-CLI agent, or push malicious updates toward WP-CLI itself. The vulnerability stems from the fact that the default behavior of `WP_CLI\Utils\http_request()` when encountering a TLS handshake error…

PLUGIN Wp Cli

CVE-2021-29504

CRITICAL CVSS 9.1 2021-06-07
Threat Entry Updated 2024-11-21

CVE-2021-24321 - Before 1 Theme

The Bello - Directory & Listing WordPress theme before 1.6.0 did not sanitise the bt_bb_listing_field_price_range_to, bt_bb_listing_field_now_open, bt_bb_listing_field_my_lng, listing_list_view and bt_bb_listing_field_my_lat parameters before using them in a SQL statement, leading to SQL Injection issues

THEME Before 1

CVE-2021-24321

CRITICAL CVSS 9.8 2021-06-01
Threat Entry Updated 2024-11-21

CVE-2021-24314 - Before 2 Theme

The Goto WordPress theme before 2.1 did not sanitise, validate of escape the keywords GET parameter from its listing page before using it in a SQL statement, leading to an Unauthenticated SQL injection issue

THEME Before 2

CVE-2021-24314

CRITICAL CVSS 9.8 2021-05-17
Threat Entry Updated 2024-11-21

CVE-2021-24285 - Cars Seller Auto Classifieds Script Plugin

The request_list_request AJAX call of the Car Seller - Auto Classifieds Script WordPress plugin through 2.1.0, available to both authenticated and unauthenticated users, does not sanitise, validate or escape the order_id POST parameter before using it in a SQL statement, leading to a SQL Injection issue.

PLUGIN Cars Seller Auto Classifieds Script

CVE-2021-24285

CRITICAL CVSS 9.8 2021-05-14
Threat Entry Updated 2024-11-21

CVE-2021-24284 - Kaswara Plugin

The Kaswara Modern VC Addons WordPress plugin through 3.0.1 allows unauthenticated arbitrary file upload via the 'uploadFontIcon' AJAX action. The supplied zipfile being unzipped in the wp-content/uploads/kaswara/fonts_icon directory with no checks for malicious files such as PHP.

PLUGIN Kaswara

CVE-2021-24284

CRITICAL CVSS 9.8 2021-05-14
Threat Entry Updated 2024-11-21

CVE-2021-24236 - Imagements Plugin

The Imagements WordPress plugin through 1.2.5 allows images to be uploaded in comments, however only checks for the Content-Type in the request to forbid dangerous files. This allows unauthenticated attackers to upload arbitrary files by using a valid image Content-Type along with a PHP filename and code, leading to RCE.

PLUGIN Imagements

CVE-2021-24236

CRITICAL CVSS 9.8 2021-05-06
Threat Entry Updated 2024-11-21

CVE-2021-24240 - Business Hours Pro Plugin

The Business Hours Pro WordPress plugin through 5.5.0 allows a remote attacker to upload arbitrary files using its manual update functionality, leading to an unauthenticated remote code execution vulnerability.

PLUGIN Business Hours Pro

CVE-2021-24240

CRITICAL CVSS 9.8 2021-04-22
Threat Entry Updated 2024-11-21

CVE-2021-24229 - Level Ajax Action Of The Patreon Plugin

The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the ‘manage_options’ privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability.

PLUGIN Level Ajax Action Of The Patreon

CVE-2021-24229

CRITICAL CVSS 9.6 2021-04-12
Threat Entry Updated 2024-11-21

CVE-2021-24228 - Team Identified A Reflected Cross Site Scripting In The Login Form Of The Patreon Plugin

The Jetpack Scan team identified a Reflected Cross-Site Scripting in the Login Form of the Patreon WordPress plugin before 1.7.2. The WordPress login form (wp-login.php) is hooked by the plugin and offers to allow users to authenticate on the site using their Patreon account. Unfortunately, some of the error logging logic behind the scene allowed user-controlled input to be reflected on the login page, unsanitized.

PLUGIN Team Identified A Reflected Cross Site Scripting In The Login Form Of The Patreon

CVE-2021-24228

CRITICAL CVSS 9.6 2021-04-12
Threat Entry Updated 2024-11-21

CVE-2021-24223 - N5 Upload Form Plugin

The N5 Upload Form WordPress plugin through 1.0 suffers from an arbitrary file upload issue in page where a Form from the plugin is embed, as any file can be uploaded. The uploaded filename might be hard to guess as it's generated with md5(uniqid(rand())), however, in the case of misconfigured servers with Directory listing enabled, accessing it is trivial.

PLUGIN N5 Upload Form

CVE-2021-24223

CRITICAL CVSS 9.8 2021-04-12
Threat Entry Updated 2024-11-21

CVE-2021-24222 - Wp Curriculo Vitae Free Plugin

The WP-Curriculo Vitae Free WordPress plugin through 6.3 suffers from an arbitrary file upload issue in page where the [formCadastro] is embed. The form allows unauthenticated user to register and submit files for their profile picture as well as resume, without any file extension restriction, leading to RCE.

PLUGIN Wp Curriculo Vitae Free

CVE-2021-24222

CRITICAL CVSS 9.8 2021-04-12
Threat Entry Updated 2024-11-21

CVE-2021-24215 - Proper Access Control Vulnerability Was Discovered In The Controlled Admin Access Plugin

An Improper Access Control vulnerability was discovered in the Controlled Admin Access WordPress plugin before 1.5.2. Uncontrolled access to the website customization functionality and global CMS settings, like /wp-admin/customization.php and /wp-admin/options.php, can lead to a complete compromise of the target resource.

PLUGIN Proper Access Control Vulnerability Was Discovered In The Controlled Admin Access

CVE-2021-24215

CRITICAL CVSS 9.8 2021-04-12
Threat Entry Updated 2024-11-21

CVE-2021-24220 - Focusblog By Thrive Themes

Thrive “Legacy” Rise by Thrive Themes WordPress theme before 2.0.0, Luxe by Thrive Themes WordPress theme before 2.0.0, Minus by Thrive Themes WordPress theme before 2.0.0, Ignition by Thrive Themes WordPress theme before 2.0.0, FocusBlog by Thrive Themes WordPress theme before 2.0.0, Squared by Thrive Themes WordPress theme before 2.0.0, Voice WordPress theme before 2.0.0, Performag by Thrive Themes WordPress theme before 2.0.0, Pressive by Thrive Themes WordPress theme before 2.0.0, Storied by Thrive Themes WordPress theme before 2.0.0 register a REST API endpoint to compress images using the Kraken…

THEME Focusblog By Thrive Themes

CVE-2021-24220

CRITICAL CVSS 9.1 2021-04-12
Threat Entry Updated 2024-11-21

CVE-2021-24212 - Woocommerce Help Scout Plugin

The WooCommerce Help Scout WordPress plugin before 2.9.1 (https://woocommerce.com/products/woocommerce-help-scout/) allows unauthenticated users to upload any files to the site which by default will end up in wp-content/uploads/hstmp.

PLUGIN Woocommerce Help Scout

CVE-2021-24212

CRITICAL CVSS 9.8 2021-04-05
Threat Entry Updated 2024-11-21

CVE-2021-24175 - Plus Addons For Elementor Page Builder Plugin

The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.7 was being actively exploited to by malicious actors to bypass authentication, allowing unauthenticated users to log in as any user (including admin) by just providing the related username, as well as create accounts with arbitrary roles, such as admin. These issues can be exploited even if registration is disabled, and the Login widget is not active.

PLUGIN Plus Addons For Elementor Page Builder

CVE-2021-24175

CRITICAL CVSS 9.8 2021-04-05
Threat Entry Updated 2024-11-25

CVE-2021-24171 - Woocommerce Upload Files Plugin

The WooCommerce Upload Files WordPress plugin before 59.4 ran a single sanitization pass to remove blocked extensions such as .php. It was possible to bypass this and upload a file with a PHP extension by embedding a "blocked" extension within another "blocked" extension in the "wcuf_file_name" parameter. It was also possible to perform a double extension attack and upload files to a different location via path traversal using the "wcuf_current_upload_session_id" parameter.

PLUGIN Woocommerce Upload Files

CVE-2021-24171

CRITICAL CVSS 9.8 2021-04-05
Scroll to top