Lucene search

K

Simple:Press Security Vulnerabilities

cve
cve

CVE-2020-36706

The Simple:Press – WordPress Forum Plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ~/admin/resources/jscript/ajaxupload/sf-uploader.php file in versions up to, and including, 6.6.0. This makes it possible for attackers to upload arbitrary file...

9.8CVSS

9.6AI Score

0.005EPSS

2023-10-20 07:15 AM
23
cve
cve

CVE-2022-4027

The Simple:Press plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'postitem' parameter manipulated during a forum response in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping that makes injecting object and embed tags possible. T...

7.2CVSS

5.2AI Score

0.001EPSS

2022-11-29 09:15 PM
23
2
cve
cve

CVE-2022-4028

The Simple:Press plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'postitem' parameter manipulated during the profile-save action when modifying a profile signature in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping that makes i...

6.4CVSS

5AI Score

0.001EPSS

2022-11-29 09:15 PM
25
2
cve
cve

CVE-2022-4029

The Simple:Press plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sforum_[md5 hash of the WordPress URL]' cookie value in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers ...

4.7CVSS

4.6AI Score

0.001EPSS

2022-11-29 09:15 PM
27
2
cve
cve

CVE-2022-4030

The Simple:Press plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 6.8 via the 'file' parameter which can be manipulated during user avatar deletion. This makes it possible with attackers, with minimal permissions such as a subscriber, to supply paths to arbitra...

8.1CVSS

8.2AI Score

0.002EPSS

2022-11-29 09:15 PM
30
2
cve
cve

CVE-2022-4031

The Simple:Press plugin for WordPress is vulnerable to arbitrary file modifications in versions up to, and including, 6.8 via the 'file' parameter which does not properly restrict files to be edited in the context of the plugin. This makes it possible with attackers, with high-level permissions suc...

4.9CVSS

5AI Score

0.001EPSS

2022-11-29 09:15 PM
29
2