diff --git a/2024/13xxx/CVE-2024-13411.json b/2024/13xxx/CVE-2024-13411.json index a44fbcce71d..dd529402a0a 100644 --- a/2024/13xxx/CVE-2024-13411.json +++ b/2024/13xxx/CVE-2024-13411.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-13411", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Zapier for WordPress plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.5.1 via the updated_user() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-918 Server-Side Request Forgery (SSRF)", + "cweId": "CWE-918" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "zapier", + "product": { + "product_data": [ + { + "product_name": "Zapier for WordPress", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "1.5.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/701dc461-88e7-40bf-a4fb-f92723b6e05e?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/701dc461-88e7-40bf-a4fb-f92723b6e05e?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/zapier/trunk/zapier.php#L114", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/zapier/trunk/zapier.php#L114" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/zapier/trunk/zapier.php#L210", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/zapier/trunk/zapier.php#L210" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/zapier/trunk/zapier.php#L284", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/zapier/trunk/zapier.php#L284" + }, + { + "url": "https://wordpress.org/plugins/zapier/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/zapier/#developers" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3257975/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3257975/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Khayal Farzaliyev" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/13xxx/CVE-2024-13889.json b/2024/13xxx/CVE-2024-13889.json index de6de1ad010..5cc2b149e4c 100644 --- a/2024/13xxx/CVE-2024-13889.json +++ b/2024/13xxx/CVE-2024-13889.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-13889", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WordPress Importer plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 0.8.3 via deserialization of untrusted input in the 'maybe_unserialize' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-502 Deserialization of Untrusted Data", + "cweId": "CWE-502" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "wordpressdotorg", + "product": { + "product_data": [ + { + "product_name": "WordPress Importer", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "0.8.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f0795f7-6eba-4ff0-b0da-5d2b544adf14?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f0795f7-6eba-4ff0-b0da-5d2b544adf14?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L602", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L602" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L857", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L857" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L891", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L891" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L975", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wordpress-importer/trunk/class-wp-import.php#L975" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3261419/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3261419/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Francesco Carlucci" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH" } ] } diff --git a/2025/1xxx/CVE-2025-1312.json b/2025/1xxx/CVE-2025-1312.json index 8290628b62d..268c27d0df6 100644 --- a/2025/1xxx/CVE-2025-1312.json +++ b/2025/1xxx/CVE-2025-1312.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1312", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Ultimate Blocks \u2013 WordPress Blocks Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'buttonTextColor\u2019 parameter in all versions up to, and including, 3.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ultimateblocks", + "product": { + "product_data": [ + { + "product_name": "Ultimate Blocks \u2013 WordPress Blocks Plugin", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "3.2.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac422162-be05-4420-9877-d6d41b83e881?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac422162-be05-4420-9877-d6d41b83e881?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/call-to-action/block.php#L32", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/call-to-action/block.php#L32" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3260377/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3260377/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Djaidja Moundjid" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/1xxx/CVE-2025-1542.json b/2025/1xxx/CVE-2025-1542.json index 01177018e93..779db5c310d 100644 --- a/2025/1xxx/CVE-2025-1542.json +++ b/2025/1xxx/CVE-2025-1542.json @@ -1,18 +1,82 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1542", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cvd@cert.pl", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper permission control\u00a0vulnerability in the OXARI\u00a0ServiceDesk\u00a0application could allow an attacker\u00a0using a guest access or an unprivileged account to gain additional administrative permissions in the application.This issue affects OXARI\u00a0ServiceDesk in versions before 2.0.324.0." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863 Incorrect Authorization", + "cweId": "CWE-863" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Infonet Projekt SA", + "product": { + "product_data": [ + { + "product_name": "OXARI ServiceDesk", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "2.0.324.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert.pl/en/posts/2025/03/CVE-2025-1542/", + "refsource": "MISC", + "name": "https://cert.pl/en/posts/2025/03/CVE-2025-1542/" + }, + { + "url": "https://www.oxari.com/en/product/oxari-servicedesk", + "refsource": "MISC", + "name": "https://www.oxari.com/en/product/oxari-servicedesk" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Robert Jaroszuk - Penetration Tester @ Lufthansa Systems Poland" + } + ] } \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1769.json b/2025/1xxx/CVE-2025-1769.json index 915df043d8c..5e9d85b5487 100644 --- a/2025/1xxx/CVE-2025-1769.json +++ b/2025/1xxx/CVE-2025-1769.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1769", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Product Import Export for WooCommerce \u2013 Import Export Product CSV Suite plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.5.0 via the download_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary log files on the server, which can contain sensitive information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "webtoffee", + "product": { + "product_data": [ + { + "product_name": "Product Import Export for WooCommerce \u2013 Import Export Product CSV Suite", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.5.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4df60fbe-4475-4cbf-b497-a9c5251bc91f?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4df60fbe-4475-4cbf-b497-a9c5251bc91f?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/history/history.php#L753", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/history/history.php#L753" + }, + { + "url": "https://wordpress.org/plugins/product-import-export-for-woo/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/product-import-export-for-woo/#developers" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3261194/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3261194/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Hay Mizrachi" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/1xxx/CVE-2025-1911.json b/2025/1xxx/CVE-2025-1911.json index f2873d84de8..4af23c88e25 100644 --- a/2025/1xxx/CVE-2025-1911.json +++ b/2025/1xxx/CVE-2025-1911.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1911", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Product Import Export for WooCommerce \u2013 Import Export Product CSV Suite plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the admin_log_page() function in all versions up to, and including, 2.5.0. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary log files on the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-73 External Control of File Name or Path", + "cweId": "CWE-73" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "webtoffee", + "product": { + "product_data": [ + { + "product_name": "Product Import Export for WooCommerce \u2013 Import Export Product CSV Suite", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.5.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d222ef6d-cdec-482e-92ba-65eeabbcdeae?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d222ef6d-cdec-482e-92ba-65eeabbcdeae?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/history/history.php#L248", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/history/history.php#L248" + }, + { + "url": "https://wordpress.org/plugins/product-import-export-for-woo/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/product-import-export-for-woo/#developers" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3261194/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3261194/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Hay Mizrachi" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 2.7, + "baseSeverity": "LOW" } ] } diff --git a/2025/1xxx/CVE-2025-1912.json b/2025/1xxx/CVE-2025-1912.json index 08139eeeac6..dd52746a868 100644 --- a/2025/1xxx/CVE-2025-1912.json +++ b/2025/1xxx/CVE-2025-1912.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1912", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Product Import Export for WooCommerce \u2013 Import Export Product CSV Suite plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.5.0 via the validate_file() Function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-918 Server-Side Request Forgery (SSRF)", + "cweId": "CWE-918" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "webtoffee", + "product": { + "product_data": [ + { + "product_name": "Product Import Export for WooCommerce \u2013 Import Export Product CSV Suite", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.5.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/406b52dc-3d36-4b03-a932-34f456395979?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/406b52dc-3d36-4b03-a932-34f456395979?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/import/classes/class-import-ajax.php#L175", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/import/classes/class-import-ajax.php#L175" + }, + { + "url": "https://wordpress.org/plugins/product-import-export-for-woo/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/product-import-export-for-woo/#developers" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3261194/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3261194/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Hay Mizrachi" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N", + "baseScore": 7.6, + "baseSeverity": "HIGH" } ] } diff --git a/2025/1xxx/CVE-2025-1913.json b/2025/1xxx/CVE-2025-1913.json index de3bc5078ce..8d29e041246 100644 --- a/2025/1xxx/CVE-2025-1913.json +++ b/2025/1xxx/CVE-2025-1913.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1913", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Product Import Export for WooCommerce \u2013 Import Export Product CSV Suite plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.5.0 via deserialization of untrusted input from the 'form_data' parameter This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-502 Deserialization of Untrusted Data", + "cweId": "CWE-502" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "webtoffee", + "product": { + "product_data": [ + { + "product_name": "Product Import Export for WooCommerce \u2013 Import Export Product CSV Suite", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.5.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4464bb1-273a-42c4-a7ec-8e123d286963?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4464bb1-273a-42c4-a7ec-8e123d286963?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/import/classes/class-import-ajax.php", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/import/classes/class-import-ajax.php" + }, + { + "url": "https://wordpress.org/plugins/product-import-export-for-woo/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/product-import-export-for-woo/#developers" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3261194/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3261194/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Hay Mizrachi" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH" } ] } diff --git a/2025/27xxx/CVE-2025-27551.json b/2025/27xxx/CVE-2025-27551.json index 39c4e320542..65e80d27e03 100644 --- a/2025/27xxx/CVE-2025-27551.json +++ b/2025/27xxx/CVE-2025-27551.json @@ -1,18 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-27551", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-request@security.metacpan.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes.\n\nThis vulnerability is associated with program files lib/DBIx/Class/EncodedColumn/Digest.pm.\n\nThis issue affects DBIx::Class::EncodedColumn until 0.00032." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", + "cweId": "CWE-338" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.metacpan.org/docs/guides/random-data-for-security.html", + "refsource": "MISC", + "name": "https://security.metacpan.org/docs/guides/random-data-for-security.html" + }, + { + "url": "https://metacpan.org/release/WREIS/DBIx-Class-EncodedColumn-0.00032/changes", + "refsource": "MISC", + "name": "https://metacpan.org/release/WREIS/DBIx-Class-EncodedColumn-0.00032/changes" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "INTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Robert Rothenberg" + } + ] } \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27552.json b/2025/27xxx/CVE-2025-27552.json index aa88cd4011f..1eb1f4602d5 100644 --- a/2025/27xxx/CVE-2025-27552.json +++ b/2025/27xxx/CVE-2025-27552.json @@ -1,18 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-27552", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-request@security.metacpan.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "DBIx::Class::EncodedColumn use the rand() function, which is not cryptographically secure to salt password hashes.\n\nThis vulnerability is associated with program files Crypt/Eksblowfish/Bcrypt.pm.\n\nThis issue affects DBIx::Class::EncodedColumn until 0.00032." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", + "cweId": "CWE-338" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://security.metacpan.org/docs/guides/random-data-for-security.html", + "refsource": "MISC", + "name": "https://security.metacpan.org/docs/guides/random-data-for-security.html" + }, + { + "url": "https://metacpan.org/release/WREIS/DBIx-Class-EncodedColumn-0.00032/changes", + "refsource": "MISC", + "name": "https://metacpan.org/release/WREIS/DBIx-Class-EncodedColumn-0.00032/changes" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "INTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Robert Rothenberg" + } + ] } \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2110.json b/2025/2xxx/CVE-2025-2110.json index fa3b84e6ee8..1774e938f31 100644 --- a/2025/2xxx/CVE-2025-2110.json +++ b/2025/2xxx/CVE-2025-2110.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2110", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WP Compress \u2013 Instant Performance & Speed Optimization plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to missing capability checks on its on its AJAX functions in all versions up to, and including, 6.30.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to compromise the site in various ways depending on the specific function exploited - for example, by retrieving sensitive settings and configuration details, or by altering and deleting them, thereby disclosing sensitive information, disrupting the plugin\u2019s functionality, and potentially impacting overall site performance." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862 Missing Authorization", + "cweId": "CWE-862" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "smartersite", + "product": { + "product_data": [ + { + "product_name": "WP Compress \u2013 Instant Performance & Speed Optimization", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "6.30.15" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2bb4ead4-b2ad-42b4-92a0-fb7293f6df06?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2bb4ead4-b2ad-42b4-92a0-fb7293f6df06?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-compress-image-optimizer/tags/6.30.15/classes/ajax.class.php", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wp-compress-image-optimizer/tags/6.30.15/classes/ajax.class.php" + }, + { + "url": "https://wordpress.org/plugins/wp-compress-image-optimizer/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wp-compress-image-optimizer/#developers" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3254259/", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3254259/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Michael Mazzolini" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH" } ] }