-
Notifications
You must be signed in to change notification settings - Fork 337
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
GHSA-594g-qx5x-32v8 GHSA-5f6w-q9hm-9whp GHSA-5qfq-f4mc-vp2x GHSA-7r2m-9pq4-w3pv GHSA-8qcp-625c-54ww GHSA-92r6-576v-g4gg GHSA-9mr9-9jpx-v54p GHSA-f3hj-px43-qpfm GHSA-fx7j-93q4-w74p GHSA-grc4-v3q8-vpc8 GHSA-h4cx-vh6c-6cmq GHSA-h7j2-r3qv-9q3v GHSA-h8ff-xm6f-g53p GHSA-jcwr-f32q-qc8g GHSA-qhq6-88r3-4vr4 GHSA-rw7j-3chm-m69x GHSA-rxw3-qw9q-pjf9 GHSA-v554-ffg4-x8gc GHSA-vg26-g32m-3x67 GHSA-wj6r-j2cr-pgm5 GHSA-wph3-vq9m-q946 GHSA-wq39-wh7h-h4qx GHSA-wq9h-h745-r69v GHSA-xhgw-hf2q-c493
- Loading branch information
1 parent
925732a
commit 8d98b64
Showing
24 changed files
with
1,052 additions
and
0 deletions.
There are no files selected for viewing
42 changes: 42 additions & 0 deletions
42
advisories/unreviewed/2024/11/GHSA-594g-qx5x-32v8/GHSA-594g-qx5x-32v8.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,42 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-594g-qx5x-32v8", | ||
"modified": "2024-11-16T06:30:40Z", | ||
"published": "2024-11-16T06:30:40Z", | ||
"aliases": [ | ||
"CVE-2024-6628" | ||
], | ||
"details": "The EleForms – All In One Form Integration including DB for Elementor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.9.9.9. This is due to missing or incorrect nonce validation when deleting form submissions. This makes it possible for unauthenticated attackers to delete form submissions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" | ||
} | ||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-6628" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://wordpress.org/plugins/all-contact-form-integration-for-elementor/#developers" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c21f5461-9c1e-48ec-b15f-6a9be1e27b43?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-352" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2024-11-16T04:15:06Z" | ||
} | ||
} |
46 changes: 46 additions & 0 deletions
46
advisories/unreviewed/2024/11/GHSA-5f6w-q9hm-9whp/GHSA-5f6w-q9hm-9whp.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-5f6w-q9hm-9whp", | ||
"modified": "2024-11-16T06:30:41Z", | ||
"published": "2024-11-16T06:30:41Z", | ||
"aliases": [ | ||
"CVE-2024-9839" | ||
], | ||
"details": "The The Uix Slideshow plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" | ||
} | ||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9839" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/browser/uix-slideshow/trunk/includes/shortcodes.php#L26" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://wordpress.org/plugins/uix-slideshow/#developers" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f189f606-ec30-4f5d-81c9-d526ba7141f0?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-94" | ||
], | ||
"severity": "HIGH", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2024-11-16T04:15:07Z" | ||
} | ||
} |
46 changes: 46 additions & 0 deletions
46
advisories/unreviewed/2024/11/GHSA-5qfq-f4mc-vp2x/GHSA-5qfq-f4mc-vp2x.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-5qfq-f4mc-vp2x", | ||
"modified": "2024-11-16T06:30:40Z", | ||
"published": "2024-11-16T06:30:40Z", | ||
"aliases": [ | ||
"CVE-2024-10262" | ||
], | ||
"details": "The The Drop Shadow Boxes plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.7.14. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" | ||
} | ||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10262" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/browser/drop-shadow-boxes/trunk/dropshadowboxes.php#L150" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://wordpress.org/plugins/drop-shadow-boxes/#developers" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa0a296a-a93f-4c0e-9911-b4f9bdd53fad?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-94" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2024-11-16T04:15:04Z" | ||
} | ||
} |
46 changes: 46 additions & 0 deletions
46
advisories/unreviewed/2024/11/GHSA-7r2m-9pq4-w3pv/GHSA-7r2m-9pq4-w3pv.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-7r2m-9pq4-w3pv", | ||
"modified": "2024-11-16T06:30:41Z", | ||
"published": "2024-11-16T06:30:41Z", | ||
"aliases": [ | ||
"CVE-2024-9386" | ||
], | ||
"details": "The Exclusive Divi – Divi Preloader, Modules for Divi & Extra Theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" | ||
} | ||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9386" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/browser/exclusive-divi/trunk/public/script-handler.php#L62" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://wordpress.org/plugins/exclusive-divi/#developers" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7bf68565-ea30-4caf-8323-b0b88561e89f?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-79" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2024-11-16T04:15:07Z" | ||
} | ||
} |
50 changes: 50 additions & 0 deletions
50
advisories/unreviewed/2024/11/GHSA-8qcp-625c-54ww/GHSA-8qcp-625c-54ww.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,50 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-8qcp-625c-54ww", | ||
"modified": "2024-11-16T06:30:40Z", | ||
"published": "2024-11-16T06:30:40Z", | ||
"aliases": [ | ||
"CVE-2024-10533" | ||
], | ||
"details": "The WP Chat App plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the ajax_install_plugin() function in all versions up to, and including, 3.6.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the filebird plugin.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" | ||
} | ||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10533" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/browser/wp-whatsapp/tags/3.6.7/includes/Cross.php#L206" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/browser/wp-whatsapp/trunk/includes/Cross.php#L206" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/changeset/3186930/wp-whatsapp/trunk/includes/Cross.php" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26f73bfe-f41a-4045-9d72-21181a9a704f?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-862" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2024-11-16T04:15:04Z" | ||
} | ||
} |
42 changes: 42 additions & 0 deletions
42
advisories/unreviewed/2024/11/GHSA-92r6-576v-g4gg/GHSA-92r6-576v-g4gg.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,42 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-92r6-576v-g4gg", | ||
"modified": "2024-11-16T06:30:40Z", | ||
"published": "2024-11-16T06:30:40Z", | ||
"aliases": [ | ||
"CVE-2024-10884" | ||
], | ||
"details": "The SimpleForm Contact Form Submissions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.1.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" | ||
} | ||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-10884" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/browser/simpleform-contact-form-submissions/tags/2.1.0/admin/includes/class-simpleform-entries-list.php#L102" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/07f25481-51c1-4d02-85c6-561bee587587?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-79" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2024-11-16T04:15:05Z" | ||
} | ||
} |
42 changes: 42 additions & 0 deletions
42
advisories/unreviewed/2024/11/GHSA-9mr9-9jpx-v54p/GHSA-9mr9-9jpx-v54p.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,42 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-9mr9-9jpx-v54p", | ||
"modified": "2024-11-16T06:30:41Z", | ||
"published": "2024-11-16T06:30:41Z", | ||
"aliases": [ | ||
"CVE-2024-9615" | ||
], | ||
"details": "The BulkPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 0.3.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" | ||
} | ||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9615" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/browser/bulkpress/trunk/lib/classes/AdminMenuPage/class.Abstract.php#L221" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bbce4588-fbd2-4b75-8f67-51c7d02892be?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-79" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2024-11-16T04:15:07Z" | ||
} | ||
} |
42 changes: 42 additions & 0 deletions
42
advisories/unreviewed/2024/11/GHSA-f3hj-px43-qpfm/GHSA-f3hj-px43-qpfm.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,42 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-f3hj-px43-qpfm", | ||
"modified": "2024-11-16T06:30:41Z", | ||
"published": "2024-11-16T06:30:41Z", | ||
"aliases": [ | ||
"CVE-2024-9192" | ||
], | ||
"details": "The WordPress Video Robot - The Ultimate Video Importer plugin for WordPress is vulnerable to privilege escalation due to insufficient validation on user meta that can be updated in the wpvr_rate_request_result() function in all versions up to, and including, 1.20.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update their user meta on a WordPress site. This can be leveraged to update their capabilities to that of an administrator.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" | ||
} | ||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9192" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://codecanyon.net/item/wordpress-video-robot-plugin/8619739" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2da019d3-4aca-485a-aa0c-73728dc1e7c1?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-269" | ||
], | ||
"severity": "HIGH", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2024-11-16T04:15:06Z" | ||
} | ||
} |
Oops, something went wrong.