Lucene search

K
Simple-pressSimple:press

5 matches found

CVE
CVE
added 2022/11/29 9:15 p.m.37 views

CVE-2022-4030

The Simple:Press plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 6.8 via the 'file' parameter which can be manipulated during user avatar deletion. This makes it possible with attackers, with minimal permissions such as a subscriber, to supply paths to arbitra...

8.1CVSS8.2AI score0.04522EPSS
CVE
CVE
added 2022/11/29 9:15 p.m.37 views

CVE-2022-4031

The Simple:Press plugin for WordPress is vulnerable to arbitrary file modifications in versions up to, and including, 6.8 via the 'file' parameter which does not properly restrict files to be edited in the context of the plugin. This makes it possible with attackers, with high-level permissions suc...

4.9CVSS5AI score0.00044EPSS
CVE
CVE
added 2022/11/29 9:15 p.m.36 views

CVE-2022-4028

The Simple:Press plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'postitem' parameter manipulated during the profile-save action when modifying a profile signature in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping that makes i...

6.4CVSS5AI score0.00082EPSS
CVE
CVE
added 2022/11/29 9:15 p.m.36 views

CVE-2022-4029

The Simple:Press plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sforum_[md5 hash of the WordPress URL]' cookie value in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers ...

4.7CVSS4.6AI score0.0071EPSS
CVE
CVE
added 2022/11/29 9:15 p.m.33 views

CVE-2022-4027

The Simple:Press plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'postitem' parameter manipulated during a forum response in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping that makes injecting object and embed tags possible. T...

7.2CVSS5.2AI score0.00241EPSS