You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
name: Multi Uploader for Gravity Forms <= 1.1.2 - Unauth Arbitrary File Upload
5
+
author: alita-p8
6
+
severity: critical
7
+
description: |
8
+
The Multi Uploader for Gravity Forms plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1.1.2. This is due to a lack of file type validation in an AJAX action, allowing unauthenticated attackers to upload malicious files such as PHP scripts, which could lead to remote code execution.
The WP-BusinessDirectory plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'directory_id' parameter in versions up to, and including, 1.3.4 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query.
The Jobmonster theme for WordPress is vulnerable to authentication bypass in versions up to, and including, 4.9.4. This is due to improper validation of the 'check_login' email parameter, allowing unauthenticated attackers to log in as any user, including administrators.
name: Service Finder Bookings <= 3.5 - Auth Bypass
20
+
author: alita-p8
21
+
severity: critical
22
+
description: |
23
+
The Service Finder Bookings plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.5. This is due to insufficient session token validation or manipulation vulnerability, allowing attackers to gain unauthorized access to administrative accounts.
24
+
remediation: Update to the latest version available.
name: Database for Contact Form 7, WPforms, Elementor forms <= 1.4.3 - Unauth RCE via Object Injection
5
+
author: alita-p8
6
+
severity: critical
7
+
description: |
8
+
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.4.3 via PHP Object Injection. This allows unauthenticated attackers to execute arbitrary code if a suitable gadget chain is present on the server.
0 commit comments