Filtered by vendor Amentotech
Subscribe
Total
5 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-4239 | 1 Amentotech | 1 Workreap | 2023-01-04 | N/A | 6.5 MEDIUM |
The Workreap WordPress theme before 2.6.4 does not verify that an addon service belongs to the user issuing the request, or indeed that it is an addon service, when processing the workreap_addons_service_remove action, allowing any user to delete any post by knowing or guessing the id. | |||||
CVE-2022-3846 | 1 Amentotech | 1 Workreap | 2022-12-06 | N/A | 7.5 HIGH |
The Workreap WordPress theme before 2.6.3 has a vulnerability with the notifications feature as it's possible to read any user's notification (employer or freelancer) as the notification ID is brute-forceable. | |||||
CVE-2021-24500 | 1 Amentotech | 1 Workreap | 2022-10-25 | 5.8 MEDIUM | 8.1 HIGH |
Several AJAX actions available in the Workreap WordPress theme before 2.2.2 lacked CSRF protections, as well as allowing insecure direct object references that were not validated. This allows an attacker to trick a logged in user to submit a POST request to the vulnerable site, potentially modifying or deleting arbitrary objects on the target site. | |||||
CVE-2021-24499 | 1 Amentotech | 1 Workreap | 2021-09-21 | 7.5 HIGH | 9.8 CRITICAL |
The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts. | |||||
CVE-2021-24501 | 1 Amentotech | 1 Workreap | 2021-08-17 | 5.5 MEDIUM | 8.1 HIGH |
The Workreap WordPress theme before 2.2.2 had several AJAX actions missing authorization checks to verify that a user was authorized to perform critical operations such as modifying or deleting objects. This allowed a logged in user to modify or delete objects belonging to other users on the site. |