Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wordpress wordpress 1.3.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2022-4489
The HUSKY WordPress plugin prior to 1.3.2 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present.
Pluginus Husky - Products Filter Professional For Woocommerce
6.8
CVSSv2
CVE-2013-2011
WordPress W3 Super Cache Plugin prior to 1.3.2 contains a PHP code-execution vulnerability which could allow remote malicious users to inject arbitrary code. This issue exists because of an incomplete fix for CVE-2013-2009.
Automattic W3 Super Cache
NA
CVE-2023-4536
The My Account Page Editor WordPress plugin prior to 1.3.2 does not validate the profile picture to be uploaded, allowing any authenticated users, such as subscriber to upload arbitrary files to the server, leading to RCE
Koalaapps My Account Page Editor
6.8
CVSSv2
CVE-2013-3477
Cross-site request forgery (CSRF) vulnerability in the Related Posts by Zemanta plugin prior to 1.3.2 for WordPress allows remote malicious users to hijack the authentication of unspecified users for requests that change settings via unknown vectors.
Zemanta Related Posts
Zemanta Related Posts 1.3
Zemanta Related Posts 1.2
Zemanta Related Posts 1.1
Zemanta Related Posts 1.0
5
CVSSv2
CVE-2021-24831
All AJAX actions of the Tab WordPress plugin prior to 1.3.2 are available to both unauthenticated and authenticated users, allowing unauthenticated malicious users to modify various data in the plugin, such as add/edit/delete arbitrary tabs.
Rich-web Tab
6.5
CVSSv2
CVE-2021-24554
The Paytm – Donation Plugin WordPress plugin up to and including 1.3.2 does not sanitise, validate or escape the id GET parameter before using it in a SQL statement when deleting donations, leading to an authenticated SQL injection issue
Freelancetoindia Paytm-pay
4
CVSSv2
CVE-2022-1685
The Five Minute Webshop WordPress plugin up to and including 1.3.2 does not properly validate and sanitise the orderby parameter before using it in a SQL statement via the Manage Products admin page, leading to an SQL Injection
Five Minute Webshop Project Five Minute Webshop
4
CVSSv2
CVE-2022-1686
The Five Minute Webshop WordPress plugin up to and including 1.3.2 does not sanitise and escape the id parameter before using it in a SQL statement when editing a product via the admin dashboard, leading to an SQL Injection
Five Minute Webshop Project Five Minute Webshop
4.3
CVSSv2
CVE-2021-24287
The settings page of the Select All Categories and Taxonomies, Change Checkbox to Radio Buttons WordPress plugin prior to 1.3.2 did not properly sanitise the tab parameter before outputting it back, leading to a reflected Cross-Site Scripting issue
Mooveagency Select All Categories And Taxonomies\\, Change Checkbox To Radio Buttons
4.3
CVSSv2
CVE-2014-4526
Multiple cross-site scripting (XSS) vulnerabilities in callback.php in the efence plugin 1.3.2 and previous versions for WordPress allow remote malicious users to inject arbitrary web script or HTML via the (1) message, (2) zoneid, (3) pubKey, or (4) privKey parameter.
Efence Project Efence
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »