From ffd12686f53a0d40ba6ef40cffc8eb95bd4698fd Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 23 Nov 2024 04:00:35 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/40xxx/CVE-2023-40660.json | 4 +- 2024/10xxx/CVE-2024-10116.json | 86 ++++++++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10216.json | 86 ++++++++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10537.json | 76 ++++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10813.json | 76 ++++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10868.json | 76 ++++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10869.json | 81 ++++++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10874.json | 76 ++++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10886.json | 76 ++++++++++++++++++++++++++++-- 2024/10xxx/CVE-2024-10961.json | 76 ++++++++++++++++++++++++++++-- 2024/11xxx/CVE-2024-11362.json | 81 ++++++++++++++++++++++++++++++-- 2024/11xxx/CVE-2024-11415.json | 81 ++++++++++++++++++++++++++++++-- 2024/11xxx/CVE-2024-11463.json | 76 ++++++++++++++++++++++++++++-- 2024/1xxx/CVE-2024-1394.json | 36 +++++++------- 2024/9xxx/CVE-2024-9223.json | 76 ++++++++++++++++++++++++++++-- 15 files changed, 991 insertions(+), 72 deletions(-) diff --git a/2023/40xxx/CVE-2023-40660.json b/2023/40xxx/CVE-2023-40660.json index 5e6c59ebf61..061c0651d15 100644 --- a/2023/40xxx/CVE-2023-40660.json +++ b/2023/40xxx/CVE-2023-40660.json @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "Improper Authentication", - "cweId": "CWE-287" + "value": "Use of a Broken or Risky Cryptographic Algorithm", + "cweId": "CWE-327" } ] } diff --git a/2024/10xxx/CVE-2024-10116.json b/2024/10xxx/CVE-2024-10116.json index ee506cf5b3e..2b14eb3aefa 100644 --- a/2024/10xxx/CVE-2024-10116.json +++ b/2024/10xxx/CVE-2024-10116.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10116", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Twitter Follow Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'username' parameter in all versions up to, and including, 0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "alexmoss", + "product": { + "product_data": [ + { + "product_name": "FireCask\u2019s Twitter Follow Button", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "0.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fac89439-bd0a-4772-858d-d11dd0de54b6?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fac89439-bd0a-4772-858d-d11dd0de54b6?source=cve" + }, + { + "url": "https://wordpress.org/plugins/twitter-follow/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/twitter-follow/#developers" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/twitter-follow/trunk/twitter-follow.php#L34", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/twitter-follow/trunk/twitter-follow.php#L34" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3194573%40twitter-follow%2Ftrunk&old=1852833%40twitter-follow%2Ftrunk", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3194573%40twitter-follow%2Ftrunk&old=1852833%40twitter-follow%2Ftrunk" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Francesco Carlucci" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/10xxx/CVE-2024-10216.json b/2024/10xxx/CVE-2024-10216.json index eb44cef1485..b7c1a06cd03 100644 --- a/2024/10xxx/CVE-2024-10216.json +++ b/2024/10xxx/CVE-2024-10216.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10216", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WP User Manager \u2013 User Profile Builder & Membership plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'add_sidebar' and 'remove_sidebar' functions in all versions up to, and including, 2.9.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to add or remove a Carbon Fields custom sidebar if the Carbon Fields (carbon-fields) plugin is installed." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862 Missing Authorization", + "cweId": "CWE-862" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "wpusermanager", + "product": { + "product_data": [ + { + "product_name": "WP User Manager \u2013 User Profile Builder & Membership", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.9.11" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ab4e9c6-68b0-4113-bff0-c1d3c2d3dea4?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ab4e9c6-68b0-4113-bff0-c1d3c2d3dea4?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-user-manager/trunk/vendor-dist/htmlburger/carbon-fields/core/Libraries/Sidebar_Manager/Sidebar_Manager.php#L79", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wp-user-manager/trunk/vendor-dist/htmlburger/carbon-fields/core/Libraries/Sidebar_Manager/Sidebar_Manager.php#L79" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-user-manager/trunk/vendor-dist/htmlburger/carbon-fields/core/Libraries/Sidebar_Manager/Sidebar_Manager.php#L102", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wp-user-manager/trunk/vendor-dist/htmlburger/carbon-fields/core/Libraries/Sidebar_Manager/Sidebar_Manager.php#L102" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3194404/wp-user-manager/trunk/includes/class-wp-user-manager.php", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3194404/wp-user-manager/trunk/includes/class-wp-user-manager.php" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "BrokenAC ignore" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/10xxx/CVE-2024-10537.json b/2024/10xxx/CVE-2024-10537.json index a23588f89a6..533c8b0c18a 100644 --- a/2024/10xxx/CVE-2024-10537.json +++ b/2024/10xxx/CVE-2024-10537.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10537", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WP User Manager \u2013 User Profile Builder & Membership plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the validate_user_meta_key() function in all versions up to, and including, 2.9.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enumerate user meta keys." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862 Missing Authorization", + "cweId": "CWE-862" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "wpusermanager", + "product": { + "product_data": [ + { + "product_name": "WP User Manager \u2013 User Profile Builder & Membership", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.9.11" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e9a5b7e-db74-4c66-a659-85b2509fded4?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e9a5b7e-db74-4c66-a659-85b2509fded4?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3194404/wp-user-manager/trunk/includes/actions.php", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/3194404/wp-user-manager/trunk/includes/actions.php" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Tieu Pham Trong Nhan" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/10xxx/CVE-2024-10813.json b/2024/10xxx/CVE-2024-10813.json index 7cc3c2a3989..f7c7e7bcfc7 100644 --- a/2024/10xxx/CVE-2024-10813.json +++ b/2024/10xxx/CVE-2024-10813.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10813", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Product Table for WooCommerce by CodeAstrology (wooproducttable.com) plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.5.1 via the var_dump_table parameter. This makes it possible for unauthenticated attackers var data." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862 Missing Authorization", + "cweId": "CWE-862" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "codersaiful", + "product": { + "product_data": [ + { + "product_name": "Product Table for WooCommerce by CodeAstrology (wooproducttable.com)", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "3.5.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e67f680a-8942-45fa-8458-a27c78045aa1?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e67f680a-8942-45fa-8458-a27c78045aa1?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/woo-product-table/trunk/inc/shortcode-base.php", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/woo-product-table/trunk/inc/shortcode-base.php" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Nathan" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/10xxx/CVE-2024-10868.json b/2024/10xxx/CVE-2024-10868.json index 0ece227f01a..e38e8ef7559 100644 --- a/2024/10xxx/CVE-2024-10868.json +++ b/2024/10xxx/CVE-2024-10868.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10868", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Enter Addons \u2013 Ultimate Template Builder for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.1.9 via the Advanced Tabs widget due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-639 Authorization Bypass Through User-Controlled Key", + "cweId": "CWE-639" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "themelooks", + "product": { + "product_data": [ + { + "product_name": "Enter Addons \u2013 Ultimate Template Builder for Elementor", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.1.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff8e8889-ec02-4b8d-9509-2c6335fdd9a4?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff8e8889-ec02-4b8d-9509-2c6335fdd9a4?source=cve" + }, + { + "url": "https://wordpress.org/plugins/enteraddons/", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/enteraddons/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Francesco Carlucci" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/10xxx/CVE-2024-10869.json b/2024/10xxx/CVE-2024-10869.json index c67ec8c9cd2..877f78ab3be 100644 --- a/2024/10xxx/CVE-2024-10869.json +++ b/2024/10xxx/CVE-2024-10869.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10869", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WordPress Brute Force Protection \u2013 Stop Brute Force Attacks plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.2.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "guardgiant", + "product": { + "product_data": [ + { + "product_name": "WordPress Brute Force Protection \u2013 Stop Brute Force Attacks", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.2.6" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0cca8b75-c4f5-47ef-90a1-c1270e2f37c1?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0cca8b75-c4f5-47ef-90a1-c1270e2f37c1?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/guardgiant/tags/2.2.6/includes/class-guardgiant-table-login-activity-log.php#L483", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/guardgiant/tags/2.2.6/includes/class-guardgiant-table-login-activity-log.php#L483" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/guardgiant/tags/2.2.6/includes/class-guardgiant-table-login-activity-log.php#L491", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/guardgiant/tags/2.2.6/includes/class-guardgiant-table-login-activity-log.php#L491" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Peter Thaleikis" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/10xxx/CVE-2024-10874.json b/2024/10xxx/CVE-2024-10874.json index e8d1006224c..7170cb53082 100644 --- a/2024/10xxx/CVE-2024-10874.json +++ b/2024/10xxx/CVE-2024-10874.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10874", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Quotes llama plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'quotes-llama' shortcode in all versions up to, and including, 3.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "oooorgle", + "product": { + "product_data": [ + { + "product_name": "Quotes llama", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "3.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e2f3abd-0a15-4bc1-966a-22d606f3e333?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e2f3abd-0a15-4bc1-966a-22d606f3e333?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/quotes-llama/tags/3.0.0/includes/classes/class-quotesllama-search.php#L131", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/quotes-llama/tags/3.0.0/includes/classes/class-quotesllama-search.php#L131" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Peter Thaleikis" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/10xxx/CVE-2024-10886.json b/2024/10xxx/CVE-2024-10886.json index 51aa747882a..ddb09db2419 100644 --- a/2024/10xxx/CVE-2024-10886.json +++ b/2024/10xxx/CVE-2024-10886.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10886", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Tribute Testimonials \u2013 WordPress Testimonial Grid/Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tribute_testimonials_slider' shortcode in all versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "boomdevs", + "product": { + "product_data": [ + { + "product_name": "Tribute Testimonials \u2013 WordPress Testimonial Grid/Slider", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "1.0.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e461095-8dce-4502-8bbf-8c985105cf24?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e461095-8dce-4502-8bbf-8c985105cf24?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/tribute-testimonial-gridslider/tags/1.0.4/includes/class-tribute-shortcode-generator.php", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/tribute-testimonial-gridslider/tags/1.0.4/includes/class-tribute-shortcode-generator.php" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Peter Thaleikis" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/10xxx/CVE-2024-10961.json b/2024/10xxx/CVE-2024-10961.json index 7ade14673e0..3306da7c7fe 100644 --- a/2024/10xxx/CVE-2024-10961.json +++ b/2024/10xxx/CVE-2024-10961.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10961", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Social Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.9.0. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-288 Authentication Bypass Using an Alternate Path or Channel", + "cweId": "CWE-288" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "claudeschlesser", + "product": { + "product_data": [ + { + "product_name": "Social Login", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "5.9.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/43a64074-ca64-4c34-b467-06d1ad8c5aa0?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/43a64074-ca64-4c34-b467-06d1ad8c5aa0?source=cve" + }, + { + "url": "https://wordpress.org/plugins/oa-social-login/", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/oa-social-login/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "wesley" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" } ] } diff --git a/2024/11xxx/CVE-2024-11362.json b/2024/11xxx/CVE-2024-11362.json index 712339f3e44..f5c273d28b0 100644 --- a/2024/11xxx/CVE-2024-11362.json +++ b/2024/11xxx/CVE-2024-11362.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11362", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Payments Plugin and Checkout Plugin for WooCommerce: Stripe, PayPal, Square, Authorize.net plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.112.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "peachpay", + "product": { + "product_data": [ + { + "product_name": "Payments Plugin and Checkout Plugin for WooCommerce: Stripe, PayPal, Square, Authorize.net", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "1.112.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8bcd44c3-75e6-453f-a9e7-3a547eba55e1?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8bcd44c3-75e6-453f-a9e7-3a547eba55e1?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/peachpay-for-woocommerce/tags/1.107.0/core/modules/field-editor/admin/settings-field-editor.php#L242", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/peachpay-for-woocommerce/tags/1.107.0/core/modules/field-editor/admin/settings-field-editor.php#L242" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3193722%40peachpay-for-woocommerce&new=3193722%40peachpay-for-woocommerce&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3193722%40peachpay-for-woocommerce&new=3193722%40peachpay-for-woocommerce&sfp_email=&sfph_mail=" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Dale Mavers" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/11xxx/CVE-2024-11415.json b/2024/11xxx/CVE-2024-11415.json index 66175b6ff75..8b9d7fa3269 100644 --- a/2024/11xxx/CVE-2024-11415.json +++ b/2024/11xxx/CVE-2024-11415.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11415", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WP-Orphanage Extended plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the wporphanageex_menu_settings() function. This makes it possible for unauthenticated attackers to escalate the privileges of all orphan accounts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352 Cross-Site Request Forgery (CSRF)", + "cweId": "CWE-352" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "meloniq", + "product": { + "product_data": [ + { + "product_name": "WP-Orphanage Extended", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "1.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ed6255-d8df-4f57-961b-1a0c21e352ac?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ed6255-d8df-4f57-961b-1a0c21e352ac?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-orphanage-extended/trunk/wp-orphanage-extended-options.php", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wp-orphanage-extended/trunk/wp-orphanage-extended-options.php" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3194570%40wp-orphanage-extended&new=3194570%40wp-orphanage-extended&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3194570%40wp-orphanage-extended&new=3194570%40wp-orphanage-extended&sfp_email=&sfph_mail=" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "SOPROBRO" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH" } ] } diff --git a/2024/11xxx/CVE-2024-11463.json b/2024/11xxx/CVE-2024-11463.json index b9e79eb1769..f82e861a784 100644 --- a/2024/11xxx/CVE-2024-11463.json +++ b/2024/11xxx/CVE-2024-11463.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-11463", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The DeBounce Email Validator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'from', 'to', and 'key' parameters in all versions up to, and including, 5.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "debounce", + "product": { + "product_data": [ + { + "product_name": "DeBounce Email Validator", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "5.6.5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/39e8c8e1-5bf4-4e4a-91a3-cf884cccf374?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/39e8c8e1-5bf4-4e4a-91a3-cf884cccf374?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3194566%40debounce-io-email-validator&new=3194566%40debounce-io-email-validator&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3194566%40debounce-io-email-validator&new=3194566%40debounce-io-email-validator&sfp_email=&sfph_mail=" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Dale Mavers" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/1xxx/CVE-2024-1394.json b/2024/1xxx/CVE-2024-1394.json index f7f09ebca84..c658f510508 100644 --- a/2024/1xxx/CVE-2024-1394.json +++ b/2024/1xxx/CVE-2024-1394.json @@ -545,7 +545,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "1:1.23.4-5.2.rhaos4.12.el9", + "version": "1:1.23.4-5.2.rhaos4.12.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -587,7 +587,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.25.3-5.2.rhaos4.12.git44a2cb2.el9", + "version": "0:1.25.5-13.1.rhaos4.12.git76343da.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -601,7 +601,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.25.0-2.2.el8", + "version": "0:1.25.0-2.2.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -615,7 +615,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:2.14.0-7.1.rhaos4.12.el8", + "version": "0:2.14.0-5.2.rhaos4.12.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -629,7 +629,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el8", + "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -776,7 +776,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-6.2.rhaos4.13.el9", + "version": "3:4.4.1-5.2.rhaos4.13.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -804,7 +804,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-2.2.rhaos4.13.el9", + "version": "2:1.11.2-2.2.rhaos4.13.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -895,7 +895,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202403261640.p0.gf7b14a9.assembly.stream.el9", + "version": "0:4.14.0-202403261640.p0.gf7b14a9.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -951,7 +951,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "1:1.29.1-10.4.rhaos4.14.el9", + "version": "1:1.29.1-10.4.rhaos4.14.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1021,7 +1021,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.27.0-3.2.el8", + "version": "0:1.27.0-3.2.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1091,7 +1091,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404151639.p0.gf7b14a9.assembly.stream.el9", + "version": "0:4.14.0-202404151639.p0.gf7b14a9.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1119,7 +1119,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el8", + "version": "0:4.14.0-202404151639.p0.g607e2dd.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1133,7 +1133,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-11.4.rhaos4.14.el8", + "version": "3:4.4.1-11.4.rhaos4.14.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1252,7 +1252,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.28.4-8.rhaos4.15.git24f50b9.el8", + "version": "0:1.28.4-8.rhaos4.15.git24f50b9.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1266,7 +1266,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:1.28.0-3.1.el8", + "version": "0:1.28.0-3.1.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1294,7 +1294,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el8", + "version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1322,7 +1322,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-21.1.rhaos4.15.el8", + "version": "3:4.4.1-21.1.rhaos4.15.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1350,7 +1350,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "2:1.11.2-21.2.rhaos4.15.el8", + "version": "2:1.11.2-21.2.rhaos4.15.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" diff --git a/2024/9xxx/CVE-2024-9223.json b/2024/9xxx/CVE-2024-9223.json index fe1dbffb8de..e84c4e7dd13 100644 --- a/2024/9xxx/CVE-2024-9223.json +++ b/2024/9xxx/CVE-2024-9223.json @@ -1,17 +1,85 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-9223", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WPDash Notes plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wp_ajax_post_it_list_comment' function in all versions up to, and including, 1.3.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view comments on any post, including private and password protected posts, and pending and draft posts if they were previously published. The vulnerability was partially patched in version 1.3.5." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862 Missing Authorization", + "cweId": "CWE-862" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "wpformation", + "product": { + "product_data": [ + { + "product_name": "WPDash Notes", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "1.3.5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58f048e5-f4be-4452-8fed-16871f4020b6?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58f048e5-f4be-4452-8fed-16871f4020b6?source=cve" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wpdash-notes/trunk/classes/plugin.php#L210", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/wpdash-notes/trunk/classes/plugin.php#L210" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Francesco Carlucci" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" } ] }