Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wordpress wordpress 1.3.2 vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2013-2011
WordPress W3 Super Cache Plugin prior to 1.3.2 contains a PHP code-execution vulnerability which could allow remote malicious users to inject arbitrary code. This issue exists because of an incomplete fix for CVE-2013-2009.
Automattic W3 Super Cache
6.5
CVSSv2
CVE-2021-24554
The Paytm – Donation Plugin WordPress plugin up to and including 1.3.2 does not sanitise, validate or escape the id GET parameter before using it in a SQL statement when deleting donations, leading to an authenticated SQL injection issue
Freelancetoindia Paytm-pay
NA
CVE-2023-4536
The My Account Page Editor WordPress plugin prior to 1.3.2 does not validate the profile picture to be uploaded, allowing any authenticated users, such as subscriber to upload arbitrary files to the server, leading to RCE
Koalaapps My Account Page Editor
5
CVSSv2
CVE-2021-24831
All AJAX actions of the Tab WordPress plugin prior to 1.3.2 are available to both unauthenticated and authenticated users, allowing unauthenticated malicious users to modify various data in the plugin, such as add/edit/delete arbitrary tabs.
Rich-web Tab
4
CVSSv2
CVE-2022-1685
The Five Minute Webshop WordPress plugin up to and including 1.3.2 does not properly validate and sanitise the orderby parameter before using it in a SQL statement via the Manage Products admin page, leading to an SQL Injection
Five Minute Webshop Project Five Minute Webshop
6.8
CVSSv2
CVE-2013-3477
Cross-site request forgery (CSRF) vulnerability in the Related Posts by Zemanta plugin prior to 1.3.2 for WordPress allows remote malicious users to hijack the authentication of unspecified users for requests that change settings via unknown vectors.
Zemanta Related Posts
Zemanta Related Posts 1.3
Zemanta Related Posts 1.2
Zemanta Related Posts 1.1
Zemanta Related Posts 1.0
4
CVSSv2
CVE-2022-1686
The Five Minute Webshop WordPress plugin up to and including 1.3.2 does not sanitise and escape the id parameter before using it in a SQL statement when editing a product via the admin dashboard, leading to an SQL Injection
Five Minute Webshop Project Five Minute Webshop
4.3
CVSSv2
CVE-2021-24287
The settings page of the Select All Categories and Taxonomies, Change Checkbox to Radio Buttons WordPress plugin prior to 1.3.2 did not properly sanitise the tab parameter before outputting it back, leading to a reflected Cross-Site Scripting issue
Mooveagency Select All Categories And Taxonomies\\, Change Checkbox To Radio Buttons
4.3
CVSSv2
CVE-2021-34643
The Skaut bazar WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/skaut-bazar.php file which allows malicious users to inject arbitrary web scripts, in versions up to and including 1.3.2.
Skaut-bazar Project Skaut-bazar
4.3
CVSSv2
CVE-2014-4526
Multiple cross-site scripting (XSS) vulnerabilities in callback.php in the efence plugin 1.3.2 and previous versions for WordPress allow remote malicious users to inject arbitrary web script or HTML via the (1) message, (2) zoneid, (3) pubKey, or (4) privKey parameter.
Efence Project Efence
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27977
IMAP
local users
CVE-2024-32038
CVE-2023-49963
CVE-2023-22869
CVE-2024-31497
local
CVE-2024-2961
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »