Lucene search

K

5 matches found

CVE
CVE
added 2025/02/14 11:15 a.m.82 views

CVE-2025-0821

Bit Assist plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authentic...

6.5CVSS7.4AI score0.00069EPSS
CVE
CVE
added 2025/02/15 1:15 p.m.70 views

CVE-2025-0822

Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the fileID Parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain ...

6.5CVSS6.6AI score0.00084EPSS
CVE
CVE
added 2025/02/14 11:15 a.m.41 views

CVE-2024-13791

Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the downloadResponseFile() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary files on the server, ...

4.9CVSS6.6AI score0.00087EPSS
CVE
CVE
added 2023/08/21 5:15 p.m.39 views

CVE-2023-3667

The Bit Assist WordPress plugin before 1.1.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

4.8CVSS4.9AI score0.00084EPSS
CVE
CVE
added 2023/12/29 11:15 a.m.34 views

CVE-2023-51371

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bit Assist Chat Widget: WhatsApp Chat, Facebook Messenger Chat, Telegram Chat Bubble, Line Messenger, Live Chat Support Chat Button, WeChat, SMS, Call Button, Customer Support Button with floating ...

5.9CVSS5.3AI score0.00122EPSS