Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Plugin-planet Subscribe
Total 8 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-25610 1 Plugin-planet 1 Simple Ajax Chat 2022-12-02 4.3 MEDIUM 6.1 MEDIUM
Unauthenticated Stored Cross-Site Scripting (XSS) in Simple Ajax Chat <= 20220115 allows an attacker to store the malicious code. However, the attack requires specific conditions, making it hard to exploit.
CVE-2022-27850 1 Plugin-planet 1 Simple Ajax Chat 2022-04-21 4.3 MEDIUM 4.3 MEDIUM
Cross-Site Request Forgery (CSRF) in Simple Ajax Chat (WordPress plugin) <= 20220115 allows an attacker to clear the chat log or delete a chat message.
CVE-2022-27849 1 Plugin-planet 1 Simple Ajax Chat 2022-04-21 5.0 MEDIUM 7.5 HIGH
Sensitive Information Disclosure (sac-export.csv) in Simple Ajax Chat (WordPress plugin) <= 20220115
CVE-2022-25601 2 Fedoraproject, Plugin-planet 2 Fedora, Contact Form X 2022-04-18 4.3 MEDIUM 6.1 MEDIUM
Reflected Cross-Site Scripting (XSS) vulnerability affecting parameter &tab discovered in Contact Form X WordPress plugin (versions <= 2.4).
CVE-2022-1165 1 Plugin-planet 1 Blackhole For Bad Bots 2022-04-12 6.4 MEDIUM 9.1 CRITICAL
The Blackhole for Bad Bots WordPress plugin before 3.3.2 uses headers such as CF-CONNECTING-IP, CLIENT-IP etc to determine the IP address of requests hitting the blackhole URL, which allows them to be spoofed. This could result in blocking arbitrary IP addresses, such as legitimate/good search engine crawlers / bots. This could also be abused by competitors to cause damage related to visibility in search engines, can be used to bypass arbitrary blocks caused by this plugin, block any visitor or even the administrator and even more.
CVE-2021-24409 1 Plugin-planet 1 Prismatic 2021-07-15 4.3 MEDIUM 6.1 MEDIUM
The Prismatic WordPress plugin before 2.8 does not escape the 'tab' GET parameter before outputting it back in an attribute, leading to a reflected Cross-Site Scripting issue which will be executed in the context of a logged in administrator
CVE-2021-24408 1 Plugin-planet 1 Prismatic 2021-07-15 3.5 LOW 5.4 MEDIUM
The Prismatic WordPress plugin before 2.8 does not sanitise or validate some of its shortcode parameters, allowing users with a role as low as Contributor to set Cross-Site payload in them. A post made by a contributor would still have to be approved by an admin to have the XSS trigger able in the frontend, however, higher privilege users, such as editor could exploit this without the need of approval, and even when the blog disallows the unfiltered_html capability.
CVE-2016-11001 1 Plugin-planet 1 User Submitted Posts 2019-09-20 4.3 MEDIUM 6.1 MEDIUM
The user-submitted-posts plugin before 20160215 for WordPress has XSS via the user-submitted-content field.