Skip to content

Commit 126e234

Browse files
committed
Auto-Update: 2026-02-27T11:00:11.310528+00:00
1 parent 13f22d9 commit 126e234

File tree

18 files changed

+1239
-33
lines changed

18 files changed

+1239
-33
lines changed
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"id": "CVE-2024-10938",
3+
"sourceIdentifier": "security@wordfence.com",
4+
"published": "2026-02-27T10:16:18.957",
5+
"lastModified": "2026-02-27T10:16:18.957",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The OVRI Payment plugin for WordPress contains malicious .htaccess files in version 1.7.0. The files contain directives to prevent the execution of certain scripts while allowing execution of known malicious PHP files. If moved outside of the plugin's directory, they may interfere with the proper function of a site."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "security@wordfence.com",
18+
"type": "Primary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
22+
"baseScore": 6.5,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "NONE",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "NONE",
30+
"integrityImpact": "LOW",
31+
"availabilityImpact": "LOW"
32+
},
33+
"exploitabilityScore": 3.9,
34+
"impactScore": 2.5
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "security@wordfence.com",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-506"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://plugins.trac.wordpress.org/browser/moneytigo/tags/1.7.0/.htaccess",
53+
"source": "security@wordfence.com"
54+
},
55+
{
56+
"url": "https://plugins.trac.wordpress.org/browser/moneytigo/tags/1.7.0/assets/.htaccess",
57+
"source": "security@wordfence.com"
58+
},
59+
{
60+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b45674c-8446-44eb-a45a-15dab02c89cf?source=cve",
61+
"source": "security@wordfence.com"
62+
}
63+
]
64+
}
Lines changed: 80 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,80 @@
1+
{
2+
"id": "CVE-2025-12150",
3+
"sourceIdentifier": "secalert@redhat.com",
4+
"published": "2026-02-27T09:16:15.227",
5+
"lastModified": "2026-02-27T09:16:15.227",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "A flaw was found in Keycloak\u2019s WebAuthn registration component. This vulnerability allows an attacker to bypass the configured attestation policy and register untrusted or forged authenticators via submission of an attestation object with fmt: \"none\", even when the realm is configured to require direct attestation. This can lead to weakened authentication integrity and unauthorized authenticator registration."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "secalert@redhat.com",
18+
"type": "Primary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
22+
"baseScore": 3.1,
23+
"baseSeverity": "LOW",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "HIGH",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "REQUIRED",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "NONE",
30+
"integrityImpact": "LOW",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 1.6,
34+
"impactScore": 1.4
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "secalert@redhat.com",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-347"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://access.redhat.com/errata/RHSA-2025:21370",
53+
"source": "secalert@redhat.com"
54+
},
55+
{
56+
"url": "https://access.redhat.com/errata/RHSA-2025:21371",
57+
"source": "secalert@redhat.com"
58+
},
59+
{
60+
"url": "https://access.redhat.com/errata/RHSA-2025:22088",
61+
"source": "secalert@redhat.com"
62+
},
63+
{
64+
"url": "https://access.redhat.com/errata/RHSA-2025:22089",
65+
"source": "secalert@redhat.com"
66+
},
67+
{
68+
"url": "https://access.redhat.com/security/cve/CVE-2025-12150",
69+
"source": "secalert@redhat.com"
70+
},
71+
{
72+
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2406192",
73+
"source": "secalert@redhat.com"
74+
},
75+
{
76+
"url": "https://github.com/keycloak/keycloak/issues/43723",
77+
"source": "secalert@redhat.com"
78+
}
79+
]
80+
}
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"id": "CVE-2025-14142",
3+
"sourceIdentifier": "security@wordfence.com",
4+
"published": "2026-02-27T10:16:21.670",
5+
"lastModified": "2026-02-27T10:16:21.670",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The Electric Enquiries plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'button' parameter of the electric-enquiry shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "security@wordfence.com",
18+
"type": "Primary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
22+
"baseScore": 6.4,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "LOW",
27+
"userInteraction": "NONE",
28+
"scope": "CHANGED",
29+
"confidentialityImpact": "LOW",
30+
"integrityImpact": "LOW",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 3.1,
34+
"impactScore": 2.7
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "security@wordfence.com",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-79"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://plugins.trac.wordpress.org/browser/electric-enquiries/tags/1.1/electric-enquiries.php#L76",
53+
"source": "security@wordfence.com"
54+
},
55+
{
56+
"url": "https://plugins.trac.wordpress.org/browser/electric-enquiries/trunk/electric-enquiries.php#L76",
57+
"source": "security@wordfence.com"
58+
},
59+
{
60+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2f99da73-1db9-43ee-ac74-b772882baf15?source=cve",
61+
"source": "security@wordfence.com"
62+
}
63+
]
64+
}
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
{
2+
"id": "CVE-2026-1305",
3+
"sourceIdentifier": "security@wordfence.com",
4+
"published": "2026-02-27T10:16:21.863",
5+
"lastModified": "2026-02-27T10:16:21.863",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The Japanized for WooCommerce plugin for WordPress is vulnerable to Improper Authentication in versions up to, and including, 2.8.4. This is due to a flawed permission check in the `paidy_webhook_permission_check` function that unconditionally returns `true` when the webhook signature header is omitted. This makes it possible for unauthenticated attackers to bypass payment verification and fraudulently mark orders as \"Processing\" or \"Completed\" without actual payment via a crafted POST request to the Paidy webhook endpoint."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "security@wordfence.com",
18+
"type": "Primary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
22+
"baseScore": 5.3,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "NONE",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "NONE",
30+
"integrityImpact": "LOW",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 3.9,
34+
"impactScore": 1.4
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "security@wordfence.com",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-287"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-for-japan/tags/2.8.2/includes/gateways/paidy/class-wc-paidy-endpoint.php#L108",
53+
"source": "security@wordfence.com"
54+
},
55+
{
56+
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-for-japan/tags/2.8.2/includes/gateways/paidy/class-wc-paidy-endpoint.php#L63",
57+
"source": "security@wordfence.com"
58+
},
59+
{
60+
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-for-japan/trunk/includes/gateways/paidy/class-wc-paidy-endpoint.php#L108",
61+
"source": "security@wordfence.com"
62+
},
63+
{
64+
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-for-japan/trunk/includes/gateways/paidy/class-wc-paidy-endpoint.php#L63",
65+
"source": "security@wordfence.com"
66+
},
67+
{
68+
"url": "https://plugins.trac.wordpress.org/changeset/3464868/woocommerce-for-japan/trunk/includes/gateways/paidy/class-wc-paidy-endpoint.php",
69+
"source": "security@wordfence.com"
70+
},
71+
{
72+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8cef4b2b-ae8d-4e18-b763-6960a0b944f7?source=cve",
73+
"source": "security@wordfence.com"
74+
}
75+
]
76+
}
Lines changed: 76 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,76 @@
1+
{
2+
"id": "CVE-2026-1626",
3+
"sourceIdentifier": "psirt@sick.de",
4+
"published": "2026-02-27T09:16:15.863",
5+
"lastModified": "2026-02-27T09:16:15.863",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "An attacker may exploit the use of weak CBC-based cipher suites in the device\u2019s SSH service to potentially observe or manipulate parts of the encrypted SSH communication, if they are able to intercept or interact with the network traffic."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "psirt@sick.de",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
22+
"baseScore": 6.5,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "REQUIRED",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "HIGH",
30+
"integrityImpact": "NONE",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 2.8,
34+
"impactScore": 3.6
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "psirt@sick.de",
41+
"type": "Secondary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-327"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://sick.com/psirt",
53+
"source": "psirt@sick.de"
54+
},
55+
{
56+
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
57+
"source": "psirt@sick.de"
58+
},
59+
{
60+
"url": "https://www.first.org/cvss/calculator/3.1",
61+
"source": "psirt@sick.de"
62+
},
63+
{
64+
"url": "https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.json",
65+
"source": "psirt@sick.de"
66+
},
67+
{
68+
"url": "https://www.sick.com/.well-known/csaf/white/2026/sca-2026-0005.pdf",
69+
"source": "psirt@sick.de"
70+
},
71+
{
72+
"url": "https://www.sick.com/media/docs/9/19/719/special_information_sick_operating_guidelines_cybersecurity_by_sick_en_im0106719.pdf",
73+
"source": "psirt@sick.de"
74+
}
75+
]
76+
}

0 commit comments

Comments
 (0)