Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sandhillsdev easy digital downloads vulnerabilities and exploits
(subscribe to this query)
4.8
CVSSv3
CVE-2024-0659
The Easy Digital Downloads – Sell Digital Files (eCommerce Store & Payments Made Easy) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the variable pricing option title in all versions up to, and including, 3.2.6 due to insufficient input sanitizat...
Sandhillsdev Easy Digital Downloads
4.8
CVSSv3
CVE-2022-0706
The Easy Digital Downloads WordPress plugin prior to 2.11.6 does not sanitise and escape the Downloadable File Name in the Logs, which could allow high privilege users to perform Cross-Site Scripting attacks when the unfiltered_html capability is disallowed
Sandhillsdev Easy Digital Downloads
4.8
CVSSv3
CVE-2021-39354
The Easy Digital Downloads WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the $start_date and $end_date parameters found in the ~/includes/admin/payments/class-payments-table.php file which allows malicious users to inject arbitrary web scripts, in versions ...
Sandhillsdev Easy Digital Downloads
4.3
CVSSv3
CVE-2022-2387
The Easy Digital Downloads WordPress plugin prior to 3.0 does not have CSRF check in place when deleting payment history, and does not ensure that the post to be deleted is actually a payment history. As a result, attackers could make a logged in admin delete arbitrary post via a...
Sandhillsdev Easy Digital Downloads
4.3
CVSSv3
CVE-2022-0707
The Easy Digital Downloads WordPress plugin prior to 2.11.6 does not have CSRF check in place when inserting payment notes, which could allow malicious users to make a logged admin insert arbitrary notes via a CSRF attack
Sandhillsdev Easy Digital Downloads
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5248
CVE-2024-3110
CVE-2024-5552
CVE-2024-29415
HTML injection
CVE-2024-3095
TCP
type confusion
CVE-2024-1800
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5