Lucene search

K
SimplefilelistSimple-file-list

5 matches found

CVE
CVE
added 2022/04/19 9:15 p.m.149 views

CVE-2022-1119

The Simple File List WordPress plugin is vulnerable to Arbitrary File Download via the eeFile parameter found in the ~/includes/ee-downloader.php file due to missing controls which makes it possible unauthenticated attackers to supply a path to a file that will subsequently be downloaded, in versio...

7.5CVSS7.4AI score0.9133EPSS
CVE
CVE
added 2020/05/13 6:15 p.m.58 views

CVE-2020-12832

WordPress Plugin Simple File List before 4.2.8 is prone to a vulnerability that lets attackers delete arbitrary files because the application fails to properly verify user-supplied input.

9.8CVSS9.3AI score0.03743EPSS
CVE
CVE
added 2022/09/26 1:15 p.m.58 views

CVE-2022-3062

The Simple File List WordPress plugin before 4.4.12 does not escape parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting

6.1CVSS6AI score0.40293EPSS
CVE
CVE
added 2022/10/10 9:15 p.m.50 views

CVE-2022-3207

The Simple File List WordPress plugin before 4.4.12 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)

4.8CVSS4.7AI score0.00112EPSS
CVE
CVE
added 2022/10/10 9:15 p.m.45 views

CVE-2022-3208

The Simple File List WordPress plugin before 4.4.12 does not implement nonce checks, which could allow attackers to make a logged in admin create new page and change it's content via a CSRF attack.

6.5CVSS6.3AI score0.00158EPSS