Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wpdeveloper vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2022-46809
Improper Neutralization of Formula Elements in a CSV File vulnerability in WPDeveloper ReviewX – Multi-criteria Rating & Reviews for WooCommerce.This issue affects ReviewX – Multi-criteria Rating & Reviews for WooCommerce: from n/a up to and including 1.6.7.
Wpdeveloper Reviewx
9.8
CVSSv3
CVE-2022-0349
The NotificationX WordPress plugin prior to 2.3.9 does not sanitise and escape the nx_id parameter before using it in a SQL statement, leading to an Unauthenticated Blind SQL Injection
Wpdeveloper Notificationx
1 Github repository
8.8
CVSSv3
CVE-2023-26325
The 'rx_export_review' action in the ReviewX WordPress Plugin, is affected by an authenticated SQL injection vulnerability in the 'filterValue' and 'selectedColumns' parameters.
Wpdeveloper Reviewx
8.1
CVSSv3
CVE-2023-4386
The Essential Blocks plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.2.0 via deserialization of untrusted input in the get_posts function. This allows unauthenticated malicious users to inject a PHP Object. No POP chain is present in...
Wpdeveloper Essential Blocks
4.3
CVSSv3
CVE-2023-2085
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the templates function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level malicious users to obtain plugin template ...
Wpdeveloper Essential Blocks
4.3
CVSSv3
CVE-2023-2086
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the template_count function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level malicious users to obtain plugin temp...
Wpdeveloper Essential Blocks
4.3
CVSSv3
CVE-2023-2087
The Essential Blocks plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.6. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated malicious users to change plugin se...
Wpdeveloper Essential Blocks
4.3
CVSSv3
CVE-2021-24633
The Countdown Block WordPress plugin prior to 1.1.2 does not have authorisation in the eb_write_block_css AJAX action, which allows any authenticated user, such as Subscriber, to modify post contents displayed to users.
Wpdeveloper Countdown Block
5.4
CVSSv3
CVE-2023-7071
The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Table of Contents block in all versions up to, and including, 4.4.6 due to insufficient input sanitization and output esc...
Wpdeveloper Essential Blocks
9.8
CVSSv3
CVE-2023-6623
The Essential Blocks WordPress plugin prior to 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.
Wpdeveloper Essential Blocks
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-40673
CVE-2024-36674
CVE-2024-27348
unspecified
CVE-2024-24919
CVE-2024-4870
malicious code
CVE-2024-2019
hard-coded
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
NEXT »