header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

PZ Frontend Manager WordPress Plugin 1.0.5 – Cross Site Request Forgery (CSRF)

The PZ Frontend Manager WordPress Plugin version 1.0.5 and below is vulnerable to Cross Site Request Forgery (CSRF) attacks due to lack of CSRF checks in certain areas. This could allow malicious actors to manipulate logged in users into executing unintended actions.

WordPress User Registration & Membership Plugin <= 4.1.1 - Unauthenticated Privilege Escalation

The WordPress User Registration & Membership Plugin version 4.1.1 and below allows unauthenticated users to escalate privileges. An attacker can exploit this vulnerability to gain unauthorized access and perform malicious actions.

WordPress Depicter Plugin 3.6.1 – SQL Injection

The Slider & Popup Builder by Depicter plugin for WordPress up to version 3.6.1 is vulnerable to SQL Injection through the 's' parameter. Attackers can inject additional SQL queries to extract sensitive data from the database due to lack of proper input validation and escaping.

WordPress Core 6.2 – Directory Traversal

The WordPress Core version 6.2 is vulnerable to a directory traversal attack. An attacker can manipulate input in a way that allows them to access files outside of the intended directory, such as sensitive system files like /etc/passwd. This vulnerability is identified as CVE-2023-2745.

Kubio AI Page Builder <= 2.5.1 - Local File Inclusion (LFI)

The Kubio AI Page Builder plugin for WordPress version 2.5.1 and below is vulnerable to Local File Inclusion (LFI) in the `kubio_hybrid_theme_load_template` function. This allows unauthorized attackers to read arbitrary files through path traversal, potentially leading to Remote Code Execution (RCE) when combined with file upload capabilities.

KiviCare Clinic & Patient Management System (EHR) 3.6.4 – Unauthenticated SQL Injection

An unauthenticated SQL injection vulnerability was found in KiviCare Clinic & Patient Management System (EHR) version 3.6.4. The vulnerability exists in the tax_calculated_data AJAX action, where the visit_type[service_id] parameter is insufficiently escaped, allowing attackers to execute SQL injection attacks.

WordPress Plugin Background Image Cropper v1.2 – Remote Code Execution

The vulnerability in Wordpress Plugin Background Image Cropper v1.2 allows remote attackers to execute arbitrary code on the target system. By uploading a malicious PHP file, an attacker can run commands on the server remotely. This vulnerability has a CVE ID pending assignment.

WordPress File Upload < 4.23.3 Stored XSS

A Stored Cross-Site Scripting (XSS) vulnerability exists in WordPress File Upload plugin version 4.23.3 and prior. By inserting a malicious shortcode in a post, an attacker can trigger an XSS attack when a file is uploaded, leading to potential script execution in the victim's browser. This vulnerability has been assigned CVE-2023-4811.

WordPress Plugin – Membership For WooCommerce < v2.1.7 - Arbitrary File Upload to Shell (Unauthenticated)

The vulnerability allows unauthenticated attackers to upload arbitrary files leading to remote code execution. An attacker can exploit this vulnerability by uploading a malicious file containing PHP code. This vulnerability has a CVE assigned: CVE-2024-XXXXX.

Recent Exploits: