Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by CWE-639
Total 319 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-46179 1 Liuos Project 1 Liuos 2023-01-13 N/A 7.8 HIGH
LiuOS is a small Python project meant to imitate the functions of a regular operating system. Version 0.1.0 and prior of LiuOS allow an attacker to set the GITHUB_ACTIONS environment variable to anything other than null or true and skip authentication checks. This issue is patched in the latest commit (c658b4f3e57258acf5f6207a90c2f2169698ae22) by requiring the var to be set to true, causing a test script to run instead of being able to login. A potential workaround is to check for the GITHUB_ACTIONS environment variable and set it to "" (no quotes) to null the variable and force credential checks.
CVE-2022-4340 1 Reputeinfosystems 1 Bookingpress 2023-01-09 N/A 5.3 MEDIUM
The BookingPress WordPress plugin before 1.0.31 suffers from an Insecure Direct Object Reference (IDOR) vulnerability in it's thank you page, allowing any visitor to display information about any booking, including full name, date, time and service booked, by manipulating the appointment_id query parameter.
CVE-2022-4417 1 Cerber 1 Wp Cerber Security\, Anti-spam \& Malware Scan 2023-01-09 N/A 5.3 MEDIUM
The WP Cerber Security, Anti-spam & Malware Scan WordPress plugin before 9.3.3 does not properly block access to the REST API users endpoint when the blog is in a subdirectory, which could allow attackers to bypass the restriction in place and list users
CVE-2022-4239 1 Amentotech 1 Workreap 2023-01-04 N/A 6.5 MEDIUM
The Workreap WordPress theme before 2.6.4 does not verify that an addon service belongs to the user issuing the request, or indeed that it is an addon service, when processing the workreap_addons_service_remove action, allowing any user to delete any post by knowing or guessing the id.
CVE-2022-3794 1 Jegtheme 1 Jeg Elementor Kit 2022-12-30 N/A 4.3 MEDIUM
The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various AJAX actions in versions up to, and including, 2.5.6. Authenticated users can use an easily available nonce value to create header templates and make additional changes to the site, as the plugin does not use capability checks for this purpose.
CVE-2022-3805 1 Jegtheme 1 Jeg Elementor Kit 2022-12-30 N/A 7.5 HIGH
The Jeg Elementor Kit plugin for WordPress is vulnerable to authorization bypass in various functions used to update the plugin settings in versions up to, and including, 2.5.6. Unauthenticated users can use an easily available nonce, obtained from pages edited by the plugin, to update the MailChimp API key, global styles, 404 page settings, and enabled elements.
CVE-2022-3876 1 Clickstudios 1 Passwordstate 2022-12-28 N/A 6.5 MEDIUM
A vulnerability, which was classified as problematic, has been found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This issue affects some unknown processing of the file /api/browserextension/UpdatePassword/ of the component API. The manipulation of the argument PasswordID leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-216245 was assigned to this vulnerability.
CVE-2021-4226 1 Rsjoomla 1 Rsfirewall\! 2022-12-20 N/A 9.8 CRITICAL
RSFirewall tries to identify the original IP address by looking at different HTTP headers. A bypass is possible due to the way it is implemented.
CVE-2022-4097 1 Updraftplus 1 All-in-one Security 2022-12-15 N/A 5.3 MEDIUM
The All-In-One Security (AIOS) WordPress plugin before 5.0.8 is susceptible to IP Spoofing attacks, which can lead to bypassed security features (like IP blocks, rate limiting, brute force protection, and more).
CVE-2022-3930 1 Wpwax 1 Directorist 2022-12-14 N/A 6.5 MEDIUM
The Directorist WordPress plugin before 7.4.2.2 suffers from an IDOR vulnerability which an attacker can exploit to change the password of arbitrary users instead of his own.
CVE-2022-38765 1 Canon 1 Vitrea View 2022-12-12 N/A 6.5 MEDIUM
Canon Medical Informatics Vitrea Vision 7.7.76.1 does not adequately enforce access controls. An authenticated user is able to gain unauthorized access to imaging records by tampering with the vitrea-view/studies/search patientId parameter.
CVE-2022-3846 1 Amentotech 1 Workreap 2022-12-06 N/A 7.5 HIGH
The Workreap WordPress theme before 2.6.3 has a vulnerability with the notifications feature as it's possible to read any user's notification (employer or freelancer) as the notification ID is brute-forceable.
CVE-2022-4281 1 Facepay Project 1 Facepay 2022-12-06 N/A 8.8 HIGH
A vulnerability has been found in Facepay 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /face-recognition-php/facepay-master/camera.php. The manipulation of the argument userId leads to authorization bypass. The attack can be launched remotely. The identifier VDB-214789 was assigned to this vulnerability.
CVE-2022-24187 1 Sz-fujia 1 Ourphoto 2022-12-01 N/A 7.5 HIGH
The user_id and device_id on the Ourphoto App version 1.4.1 /device/* end-points both suffer from insecure direct object reference vulnerabilities. Other end-users user_id and device_id values can be enumerated by incrementing or decrementing id numbers. The impact of this vulnerability allows an attacker to discover sensitive information such as end-user email addresses, and their unique frame_token value of all other Ourphoto App end-users.
CVE-2022-3995 1 Standalonetech 1 Terawallet 2022-12-01 N/A 4.3 MEDIUM
The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets.
CVE-2022-3589 1 Miele 1 Appwash 2022-11-30 N/A 8.1 HIGH
An API Endpoint used by Miele's "AppWash" MobileApp in all versions was vulnerable to an authorization bypass. A low privileged, remote attacker would have been able to gain read and partial write access to other users data by modifying a small part of a HTTP request sent to the API. Reading or changing the password of another user was not possible, thus no impact to Availability.
CVE-2022-3511 1 Getawesomesupport 1 Awesome Support 2022-11-29 N/A 6.5 MEDIUM
The Awesome Support WordPress plugin before 6.1.2 does not ensure that the exported tickets archive to be downloaded belongs to the user making the request, allowing a low privileged user, such as subscriber to download arbitrary exported tickets via an IDOR vector
CVE-2022-0613 2 Fedoraproject, Uri.js Project 2 Fedora, Uri.js 2022-11-29 6.4 MEDIUM 6.5 MEDIUM
Authorization Bypass Through User-Controlled Key in NPM urijs prior to 1.19.8.
CVE-2022-1579 1 Gunkastudios 1 Login Block Ips 2022-11-23 N/A 7.5 HIGH
The function check_is_login_page() uses headers for the IP check, which can be easily spoofed.
CVE-2022-1581 1 Wp-polls Project 1 Wp-polls 2022-11-23 N/A 5.3 MEDIUM
The WP-Polls WordPress plugin before 2.76.0 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations to vote in certain situations.