Skip to content

Commit 2b639df

Browse files
committed
Auto-Update: 2026-02-28T09:00:14.867694+00:00
1 parent da9601d commit 2b639df

File tree

4 files changed

+141
-6
lines changed

4 files changed

+141
-6
lines changed
Lines changed: 60 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"id": "CVE-2025-13673",
3+
"sourceIdentifier": "security@wordfence.com",
4+
"published": "2026-02-28T08:15:58.317",
5+
"lastModified": "2026-02-28T08:15:58.317",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The Tutor LMS \u2013 eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. NOTE: This vulnerability was partially mitigated in versions 3.9.4 and 3.9.6."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "security@wordfence.com",
18+
"type": "Primary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
22+
"baseScore": 7.5,
23+
"baseSeverity": "HIGH",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "NONE",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "HIGH",
30+
"integrityImpact": "NONE",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 3.9,
34+
"impactScore": 3.6
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "security@wordfence.com",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-89"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://plugins.trac.wordpress.org/changeset/3469242/tutor",
53+
"source": "security@wordfence.com"
54+
},
55+
{
56+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/007df869-dacb-4b0a-9c98-50586934cdab?source=cve",
57+
"source": "security@wordfence.com"
58+
}
59+
]
60+
}
Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
{
2+
"id": "CVE-2026-2471",
3+
"sourceIdentifier": "security@wordfence.com",
4+
"published": "2026-02-28T07:15:57.677",
5+
"lastModified": "2026-02-28T07:15:57.677",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The WP Mail Logging plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.15.0 via deserialization of untrusted input from the email log message field. This is due to the `BaseModel` class constructor calling `maybe_unserialize()` on all properties retrieved from the database without validation. This makes it possible for unauthenticated attackers to inject a PHP Object by submitting a double-serialized payload through any public-facing form that sends email (e.g., Contact Form 7). When the email is logged and subsequently viewed by an administrator, the malicious payload is deserialized into an arbitrary PHP object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "security@wordfence.com",
18+
"type": "Primary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
22+
"baseScore": 7.5,
23+
"baseSeverity": "HIGH",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "HIGH",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "REQUIRED",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "HIGH",
30+
"integrityImpact": "HIGH",
31+
"availabilityImpact": "HIGH"
32+
},
33+
"exploitabilityScore": 1.6,
34+
"impactScore": 5.9
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "security@wordfence.com",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-502"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://plugins.trac.wordpress.org/browser/wp-mail-logging/tags/1.15.0/lib/vendor/brandonwamboldt/wp-orm/src/BaseModel.php#L39",
53+
"source": "security@wordfence.com"
54+
},
55+
{
56+
"url": "https://plugins.trac.wordpress.org/browser/wp-mail-logging/tags/1.15.0/src/Renderer/WPML_MailRenderer_AJAX_Handler.php#L100",
57+
"source": "security@wordfence.com"
58+
},
59+
{
60+
"url": "https://plugins.trac.wordpress.org/browser/wp-mail-logging/tags/1.15.0/src/WPML_Plugin.php#L553",
61+
"source": "security@wordfence.com"
62+
},
63+
{
64+
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3464813%40wp-mail-logging&old=3358334%40wp-mail-logging&sfp_email=&sfph_mail=",
65+
"source": "security@wordfence.com"
66+
},
67+
{
68+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/10e4c52d-c82f-4393-9a56-5714b3a108d1?source=cve",
69+
"source": "security@wordfence.com"
70+
}
71+
]
72+
}

README.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
1313
### Last Repository Update
1414

1515
```plain
16-
2026-02-28T07:00:11.497285+00:00
16+
2026-02-28T09:00:14.867694+00:00
1717
```
1818

1919
### Most recent CVE Modification Timestamp synchronized with NVD
2020

2121
```plain
22-
2026-02-28T06:16:02.080000+00:00
22+
2026-02-28T08:15:58.317000+00:00
2323
```
2424

2525
### Last Data Feed Release
@@ -33,14 +33,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
3333
### Total Number of included CVEs
3434

3535
```plain
36-
335214
36+
335216
3737
```
3838

3939
### CVEs added in the last Commit
4040

41-
Recently added CVEs: `1`
41+
Recently added CVEs: `2`
4242

43-
- [CVE-2026-1542](CVE-2026/CVE-2026-15xx/CVE-2026-1542.json) (`2026-02-28T06:16:02.080`)
43+
- [CVE-2025-13673](CVE-2025/CVE-2025-136xx/CVE-2025-13673.json) (`2026-02-28T08:15:58.317`)
44+
- [CVE-2026-2471](CVE-2026/CVE-2026-24xx/CVE-2026-2471.json) (`2026-02-28T07:15:57.677`)
4445

4546

4647
### CVEs modified in the last Commit

_state.csv

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -291293,6 +291293,7 @@ CVE-2025-1367,0,0,be2af0ac582e5ab97208ad342acc7ce8a63bb0539c316ea33d8d4cc3317593
291293291293
CVE-2025-13670,0,0,d751eff99ab65b1ce513fd95b1c2ea47f6707d55a8ea3dc30d19771ff3fac8eb,2026-01-12T15:15:20.283000
291294291294
CVE-2025-13671,0,0,603a63232a3f7e749bf1a60241e0b895f63b4e04ada9ed0671fcdea630569551,2026-02-27T23:56:23.997000
291295291295
CVE-2025-13672,0,0,04dbab5287967a4f91ef654f7db61336b880ba1a383b97fa300176b2c9264863,2026-02-27T23:55:48.210000
291296+
CVE-2025-13673,1,1,dd3caae0fabf33e2084322b8dac78cdefaf06e82c8d4c33a2c03bd16475cb675,2026-02-28T08:15:58.317000
291296291297
CVE-2025-13674,0,0,24c6011dc0ca44271ea7434dfcba84baea5b553c6b31ccde142ab19a7dd15faf,2025-12-03T19:37:17.280000
291297291298
CVE-2025-13675,0,0,3fecd73f539357ea23359c2a089fbe3a99507af75de4dcbce9bdb6a79522154c,2025-12-01T15:39:33.110000
291298291299
CVE-2025-13676,0,0,2562c15520d144b29e960c4b855ea8654ca881230d48415ac8192c5eb329f321,2026-01-26T15:03:33.357000
@@ -330841,7 +330842,7 @@ CVE-2026-1535,0,0,ca09bc3d97a637390590ad635bb0848c189a34eba1067452d24ce82426f903
330841330842
CVE-2026-1536,0,0,7a644277d33c744c2e8463507ec9de7a8cd21d90e3d5d28f5e3b3ca053bb4204,2026-01-29T16:31:00.867000
330842330843
CVE-2026-1537,0,0,825cd64e41255c1cd8a542db44b9dc5fec0e7409cf165a58284596da48c5fae8,2026-02-12T15:10:37.307000
330843330844
CVE-2026-1539,0,0,90dc33b1723704167fa264feb0c2e2c1282e9ae50592420f2c50d1f9e1595755,2026-01-29T16:31:00.867000
330844-
CVE-2026-1542,1,1,9f0acaf550e971c0f51b6c3da0660ebeb2945a6c416b7c97b747e23ea0b90673,2026-02-28T06:16:02.080000
330845+
CVE-2026-1542,0,0,9f0acaf550e971c0f51b6c3da0660ebeb2945a6c416b7c97b747e23ea0b90673,2026-02-28T06:16:02.080000
330845330846
CVE-2026-1544,0,0,878162cd920c9583f25a5de4a154b62ea0c2dd47fbd2200fac6cb4c9053b211d,2026-02-09T17:06:23.600000
330846330847
CVE-2026-1545,0,0,09eb98e8af1b60ed822a2bde1fefaee9aa8599c91f23d2bb249083b0da04a962,2026-02-02T19:41:32.603000
330847330848
CVE-2026-1546,0,0,a0eca1b2e987ee31ad60eac2d0718b165b5d8cf21e415058dfa95c779200c12d,2026-02-09T16:58:44.613000
@@ -333369,6 +333370,7 @@ CVE-2026-2469,0,0,9fef232fd8edda73b35a1a71fe55e18d8f7d750a0b915c495f51a68dea8737
333369333370
CVE-2026-24694,0,0,b85b2bd474c795ab4d5305e67d6431a6125dcc32ecf41ca8f10a98996521a809,2026-02-03T16:44:03.343000
333370333371
CVE-2026-24695,0,0,68972fe675fe4979aae39309e1f317025386c8b2dc5a8a4cd727fa0d81fdd067,2026-02-27T14:06:37.987000
333371333372
CVE-2026-24708,0,0,0b41ab456878be17d22f8acff7fcfe06d40399d46f467cec16cb5dd8ca91283d,2026-02-21T05:17:17.817000
333373+
CVE-2026-2471,1,1,84ed6aff7b5731f6c9e67495b9b1b4ccaebd0d024a07945ba14f1a35da0632dd,2026-02-28T07:15:57.677000
333372333374
CVE-2026-24714,0,0,e22e14a085f48062faa5abf1094f319c0ee9ea87f61fd81cb5e8929678c227f3,2026-02-04T16:34:21.763000
333373333375
CVE-2026-2472,0,0,5af58ed3e50ee6f6396ab6620744a29cb01d9ab4e1ed7f4279c139538e942b91,2026-02-27T18:16:14.137000
333374333376
CVE-2026-24728,0,0,62b7548940585d19c54436e9b423e9ea6cd046213c97f729f87f164099918f43,2026-02-04T16:34:21.763000

0 commit comments

Comments
 (0)