Lucene search

K

9 matches found

CVE
CVE
added 2025/04/04 7:15 a.m.70 views

CVE-2025-2780

The Woffice Core plugin for WordPress, used by the Woffice Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'saveFeaturedImage' function in all versions up to, and including, 5.4.21. This makes it possible for authenticated attackers, with Subscriber-level a...

8.8CVSS8AI score0.00457EPSS
CVE
CVE
added 2024/08/13 12:15 p.m.52 views

CVE-2024-43153

Improper Privilege Management vulnerability in WofficeIO Woffice allows Privilege Escalation.This issue affects Woffice: from n/a through 5.4.10.

9.8CVSS9.5AI score0.00317EPSS
CVE
CVE
added 2024/07/04 7:15 p.m.51 views

CVE-2024-37472

Cross Site Scripting (XSS) vulnerability in WofficeIO Woffice allows Reflected XSS.This issue affects Woffice: from n/a through 5.4.8.

7.1CVSS6.3AI score0.00154EPSS
CVE
CVE
added 2025/04/04 2:15 p.m.51 views

CVE-2025-2798

The Woffice CRM theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 5.4.21. This is due to a misconfiguration of excluded roles during registration. This makes it possible for unauthenticated attackers to register with an Administrator role if a custom l...

9.8CVSS5.8AI score0.00409EPSS
CVE
CVE
added 2025/04/04 7:15 a.m.48 views

CVE-2025-2797

The Woffice Core plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.4.21. This is due to missing or incorrect nonce validation on the 'woffice_handle_user_approval_actions' function. This makes it possible for unauthenticated attackers to approv...

5.4CVSS6.7AI score0.00026EPSS
CVE
CVE
added 2024/07/04 7:15 p.m.45 views

CVE-2024-37471

Cross Site Scripting (XSS) vulnerability in WofficeIO Woffice Core allows Reflected XSS.This issue affects Woffice Core: from n/a through 5.4.8.

7.1CVSS6.3AI score0.0011EPSS
CVE
CVE
added 2024/12/16 4:15 p.m.36 views

CVE-2024-43234

Authentication Bypass Using an Alternate Path or Channel vulnerability in WofficeIO Woffice allows Authentication Bypass.This issue affects Woffice: from n/a through 5.4.14.

9.8CVSS9.6AI score0.0025EPSS
CVE
CVE
added 2024/11/01 3:15 p.m.32 views

CVE-2024-37470

Missing Authorization vulnerability in WofficeIO Woffice Core allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Woffice Core: from n/a through 5.4.8.

9.8CVSS8.3AI score0.00378EPSS
CVE
CVE
added 2025/08/02 4:15 a.m.6 views

CVE-2025-7694

The Woffice Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the woffice_file_manager_delete() function in all versions up to, and including, 5.4.26. This makes it possible for authenticated attackers, with Contributor-level access and a...

7.5CVSS7.9AI score0.00283EPSS