diff --git a/CVE-2024/CVE-2024-137xx/CVE-2024-13702.json b/CVE-2024/CVE-2024-137xx/CVE-2024-13702.json new file mode 100644 index 00000000000..442b5c0a272 --- /dev/null +++ b/CVE-2024/CVE-2024-137xx/CVE-2024-13702.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-13702", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-26T09:15:14.323", + "lastModified": "2025-03-26T09:15:14.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The CRM and Lead Management by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'vCitaMeetingScheduler' and 'vCitaSchedulingCalendar' shortcodes in all versions up to, and including, 2.7.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3256449%40crm-customer-relationship-management-by-vcita&new=3256449%40crm-customer-relationship-management-by-vcita&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e5d3239b-0f65-46f7-977b-9995542a6eb9?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13801.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13801.json new file mode 100644 index 00000000000..8d4e7a34bf5 --- /dev/null +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13801.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-13801", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-26T09:15:15.763", + "lastModified": "2025-03-26T09:15:15.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The BWL Advanced FAQ Manager plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'baf_set_notice_status' AJAX action in all versions up to, and including, 2.1.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to '1' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://codecanyon.net/item/bwl-advanced-faq-manager/5007135", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3a84201-6cd8-4528-ae7a-7fd813c8da18?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1310.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1310.json new file mode 100644 index 00000000000..8db8b806745 --- /dev/null +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1310.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-1310", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-26T10:15:14.653", + "lastModified": "2025-03-26T10:15:14.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Jobs for WordPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.7.11 via the 'job_postings_get_file' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/job-postings/tags/2.7.11/include/class-job-get-uploaded-file.php#L91", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3257145%40job-postings&new=3257145%40job-postings&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/408312d3-9a9e-4b6b-9991-aee6b77745b2?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1437.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1437.json new file mode 100644 index 00000000000..0733a166d8a --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1437.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-1437", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-26T10:15:14.930", + "lastModified": "2025-03-26T10:15:14.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Advanced iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'advanced_iframe' shortcode in all versions up to, and including, 2024.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255604%40advanced-iframe&new=3255604%40advanced-iframe&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/676b4768-98ea-4e55-87de-ef7ae1d7a113?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1439.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1439.json new file mode 100644 index 00000000000..f8f74d7dea3 --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1439.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-1439", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-26T10:15:15.093", + "lastModified": "2025-03-26T10:15:15.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Advanced iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'advanced_iframe' shortcode in all versions up to, and including, 2024.5 due to insufficient input sanitization and output escaping on user supplied attributes through the 'src' attribute when the src supplied returns a header with an injected value . This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255604%40advanced-iframe&new=3255604%40advanced-iframe&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5ac1145b-5ab1-47a9-9117-4870c52a70fc?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-14xx/CVE-2025-1440.json b/CVE-2025/CVE-2025-14xx/CVE-2025-1440.json new file mode 100644 index 00000000000..ad0f027743f --- /dev/null +++ b/CVE-2025/CVE-2025-14xx/CVE-2025-1440.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-1440", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-26T10:15:15.260", + "lastModified": "2025-03-26T10:15:15.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Advanced iFrame plugin for WordPress is vulnerable to unauthorized excessive creation of options on the aip_map_url_callback() function in all versions up to, and including, 2024.5 due to insufficient restrictions. This makes it possible for unauthenticated attackers to update the advancediFrameParameterData option with an excessive amount of unvalidated data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255604%40advanced-iframe&new=3255604%40advanced-iframe&sfp_email=&sfph_mail=#file1", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b92913fa-aa1e-40a0-9a48-d730b2102217?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-15xx/CVE-2025-1514.json b/CVE-2025/CVE-2025-15xx/CVE-2025-1514.json new file mode 100644 index 00000000000..e8c5a947f53 --- /dev/null +++ b/CVE-2025/CVE-2025-15xx/CVE-2025-1514.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-1514", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-26T09:15:15.950", + "lastModified": "2025-03-26T09:15:15.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to unauthorized filter calling due to insufficient restrictions on the get_smth() function in all versions up to, and including, 1.0.6.7. This makes it possible for unauthenticated attackers to call arbitrary WordPress filters with a single parameter." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L1753", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3257043%40profit-products-tables-for-woocommerce&new=3257043%40profit-products-tables-for-woocommerce&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6edf91de-9553-4aa1-a29f-89771c8e852e?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-17xx/CVE-2025-1703.json b/CVE-2025/CVE-2025-17xx/CVE-2025-1703.json new file mode 100644 index 00000000000..0d3dcf82a97 --- /dev/null +++ b/CVE-2025/CVE-2025-17xx/CVE-2025-1703.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-1703", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-26T10:15:15.437", + "lastModified": "2025-03-26T10:15:15.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Ultimate Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018content\u2019 parameter in all versions up to, and including, 3.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/extensions/responsive-control/class-responsive-control.php#L46", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3260377", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3260377/ultimate-blocks/trunk/src/extensions/responsive-control/class-responsive-control.php", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/ultimate-blocks/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a2520d98-3cee-4431-bf9c-b2fd01a584ce?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-20xx/CVE-2025-2009.json b/CVE-2025/CVE-2025-20xx/CVE-2025-2009.json new file mode 100644 index 00000000000..727b207d8f5 --- /dev/null +++ b/CVE-2025/CVE-2025-20xx/CVE-2025-2009.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-2009", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-26T09:15:16.140", + "lastModified": "2025-03-26T09:15:16.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Newsletters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the logging functionality in all versions up to, and including, 4.9.9.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/newsletters-lite/trunk/views/admin/settings/view_logs.php?rev=3212300#L107", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3257980/newsletters-lite/trunk/views/admin/settings/view_logs.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3825c80c-e4b1-4dd8-be77-38f718920b9a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-21xx/CVE-2025-2167.json b/CVE-2025/CVE-2025-21xx/CVE-2025-2167.json new file mode 100644 index 00000000000..0f89a397649 --- /dev/null +++ b/CVE-2025/CVE-2025-21xx/CVE-2025-2167.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-2167", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-26T09:15:16.500", + "lastModified": "2025-03-26T09:15:16.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Event post plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'events_list' shortcodes in all versions up to, and including, 5.9.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3257882%40event-post&new=3257882%40event-post&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/32bcff2d-e322-4c9c-b1c2-f07aa54faff9?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-22xx/CVE-2025-2257.json b/CVE-2025/CVE-2025-22xx/CVE-2025-2257.json new file mode 100644 index 00000000000..1467f2d4758 --- /dev/null +++ b/CVE-2025/CVE-2025-22xx/CVE-2025-2257.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-2257", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-03-26T09:15:16.647", + "lastModified": "2025-03-26T09:15:16.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Total Upkeep \u2013 WordPress Backup Plugin plus Restore & Migrate by BoldGrid plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.16.10 via the compression_level setting. This is due to the plugin using the compression_level setting in proc_open() without any validation. This makes it possible for authenticated attackers, with administrator-level access and above, to execute code on the server." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/BoldGrid/boldgrid-backup/pull/622/files", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.svn.wordpress.org/boldgrid-backup/tags/1.16.7/admin/compressor/class-boldgrid-backup-admin-compressor-system-zip.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3257988%40boldgrid-backup&new=3257988%40boldgrid-backup&sfp_email=&sfph_mail=#file9", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1ec3cc3e-c11b-43b6-9dd0-caa5ccfb90c8?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d909acfdc52..781ec729d64 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-03-26T09:00:19.613344+00:00 +2025-03-26T11:00:20.007345+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-03-26T08:15:12.657000+00:00 +2025-03-26T10:15:15.437000+00:00 ``` ### Last Data Feed Release @@ -33,15 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -286579 +286590 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `11` -- [CVE-2023-52972](CVE-2023/CVE-2023-529xx/CVE-2023-52972.json) (`2025-03-26T07:15:36.267`) -- [CVE-2024-30155](CVE-2024/CVE-2024-301xx/CVE-2024-30155.json) (`2025-03-26T08:15:12.657`) +- [CVE-2024-13702](CVE-2024/CVE-2024-137xx/CVE-2024-13702.json) (`2025-03-26T09:15:14.323`) +- [CVE-2024-13801](CVE-2024/CVE-2024-138xx/CVE-2024-13801.json) (`2025-03-26T09:15:15.763`) +- [CVE-2025-1310](CVE-2025/CVE-2025-13xx/CVE-2025-1310.json) (`2025-03-26T10:15:14.653`) +- [CVE-2025-1437](CVE-2025/CVE-2025-14xx/CVE-2025-1437.json) (`2025-03-26T10:15:14.930`) +- [CVE-2025-1439](CVE-2025/CVE-2025-14xx/CVE-2025-1439.json) (`2025-03-26T10:15:15.093`) +- [CVE-2025-1440](CVE-2025/CVE-2025-14xx/CVE-2025-1440.json) (`2025-03-26T10:15:15.260`) +- [CVE-2025-1514](CVE-2025/CVE-2025-15xx/CVE-2025-1514.json) (`2025-03-26T09:15:15.950`) +- [CVE-2025-1703](CVE-2025/CVE-2025-17xx/CVE-2025-1703.json) (`2025-03-26T10:15:15.437`) +- [CVE-2025-2009](CVE-2025/CVE-2025-20xx/CVE-2025-2009.json) (`2025-03-26T09:15:16.140`) +- [CVE-2025-2167](CVE-2025/CVE-2025-21xx/CVE-2025-2167.json) (`2025-03-26T09:15:16.500`) +- [CVE-2025-2257](CVE-2025/CVE-2025-22xx/CVE-2025-2257.json) (`2025-03-26T09:15:16.647`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index ae33e26a217..1a7d77a4f22 100644 --- a/_state.csv +++ b/_state.csv @@ -241609,7 +241609,7 @@ CVE-2023-52969,0,0,8c08e77f2db99bb83d2b9b4ee0ad1aae170306c7f3b0cfd88a8d2e562723d CVE-2023-5297,0,0,de1f61d8e4cdd3b9b3c94e1a593ca1d09a649ba1f11645b247141deb55a46d5b,2024-11-21T08:41:28.590000 CVE-2023-52970,0,0,5dfdb9fc81d4fd69dbd7aeb44e8a1d777bbdd576da5864135cc595f270ddfa20,2025-03-08T23:15:14.527000 CVE-2023-52971,0,0,b1d0adc9a6ba8bda3f103d62a4e21100709d867ad3b0b1358ec2aefb2560b086,2025-03-08T23:15:14.683000 -CVE-2023-52972,1,1,b089cf6a02dc49341f286cf8adb8c2f3775910562fee5ed735e25f59a93c95bf,2025-03-26T07:15:36.267000 +CVE-2023-52972,0,0,b089cf6a02dc49341f286cf8adb8c2f3775910562fee5ed735e25f59a93c95bf,2025-03-26T07:15:36.267000 CVE-2023-5298,0,0,f53cf1dcb6f115d92d16e5c66372cdfa06b4033bbcfb51673e0e9ae138cbc0c7,2024-11-21T08:41:28.727000 CVE-2023-5299,0,0,d1a3f4df2181486873f0f83a21c7898914e70351cf79e1f3914b8afd11231fe5,2024-11-21T08:41:28.867000 CVE-2023-5300,0,0,eada94012fd708691ea3792cf6b054b3ad0de381a1556cd7e6c92c322c4e2e74,2024-11-21T08:41:29.013000 @@ -248018,6 +248018,7 @@ CVE-2024-13699,0,0,6c179d99e1e68d225e4cf32bfc134108fb7e1de353e5a047f158d68ed9ec8 CVE-2024-1370,0,0,da6427f03006934633b115ec37d488931b10b7ade7ab0e2e50968c13d4ecf76a,2025-03-05T17:21:25.677000 CVE-2024-13700,0,0,9ce20ac3b11103f5abdc5f2758b97ef5dcc76de719f13fdbcb103d53e58691eb,2025-01-31T16:49:24.477000 CVE-2024-13701,0,0,521368ae5abaf2abfb46429e33c728f78e759a939d38cf1b0d41e4d95d49ddef,2025-02-25T03:53:21.997000 +CVE-2024-13702,1,1,fe63a3dace858f10892a6b6902d918b8c2cea7c279d06a50e3cac75f18096316,2025-03-26T09:15:14.323000 CVE-2024-13703,0,0,6dfd68dbb32b8f6168034a526d94cad394bc6c760f20c9e7fb75bd1126bfb122,2025-03-13T02:15:11.293000 CVE-2024-13704,0,0,edacb1bf034aad21d3de74c25d716996b7c2a06ccbd4adcf15412220d4bc97f7,2025-02-21T15:34:38.797000 CVE-2024-13705,0,0,5ec6ac499cda9ee218cf1587251a6725974948adf52db55dc1b1fdc60e1d5cc2,2025-01-31T18:17:10.220000 @@ -248101,6 +248102,7 @@ CVE-2024-13798,0,0,ce094bf82021ad6e4ff8123a67b873e4d45b85370d9f1b7c7aef06d072410 CVE-2024-13799,0,0,568137e6611c802d800a1c88238ba60b18e92925318c7d21fcf20c95230c7dfb,2025-02-19T06:15:21.283000 CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae89d,2025-01-31T13:26:51.163000 CVE-2024-13800,0,0,db269d664e8ffceb549584ac138b0b3d8532020dce3ad8c5501401929c306f63,2025-02-24T15:55:09.120000 +CVE-2024-13801,1,1,bb464877728778b8a6bb042be169ab1665e06a3e723ff5179fd681a0bea46d55,2025-03-26T09:15:15.763000 CVE-2024-13802,0,0,774d150df9948895bc1c8319c04951551fc49cae4e2c0e8ce41994610c382f58,2025-02-25T20:57:34.193000 CVE-2024-13803,0,0,93a9df80fad16c66cdad18cf7b08a600f14f988ff84d4f170dbb9b255e8d0a90,2025-02-26T13:15:38.027000 CVE-2024-13805,0,0,ab23ddffd79c9236654dca87d416c22cef2f181f71a6522374ad6bbab1e39bf2,2025-03-07T10:15:16.123000 @@ -256682,7 +256684,7 @@ CVE-2024-30149,0,0,78a7b5e7d0c5c72edab93350b1cfa99172cc2391a009f41c15ff91d2caf6d CVE-2024-3015,0,0,4dfa2543ab30c11de477468d8bfbd168b7abfd5d1d708e2d95a366186fbaa151,2025-03-05T18:36:56.977000 CVE-2024-30150,0,0,4fa60d6dd4f0daeaee31653e34cf1f5215c4dba48f3d62569322a4d06540dc29,2025-02-25T23:15:10.753000 CVE-2024-30154,0,0,44393c7dbeff68b7c1c8cbce1ba7b354794da02b96328afc30511aec1959affc,2025-03-04T17:15:12.010000 -CVE-2024-30155,1,1,d913f3af533019f66b0879500df6ba95bb530617acc2186f817088601c8dcb1e,2025-03-26T08:15:12.657000 +CVE-2024-30155,0,0,d913f3af533019f66b0879500df6ba95bb530617acc2186f817088601c8dcb1e,2025-03-26T08:15:12.657000 CVE-2024-30156,0,0,92fda2ccd849293e60b2e463cac31a4dc54847a22ed3e9030d260cf180d129ee,2024-11-21T20:15:40.067000 CVE-2024-30157,0,0,559260e13715a400d85dadb0bfe165c83aef8f0ab0ce2b4b15f456f448eff1c9,2024-11-21T09:11:19.547000 CVE-2024-30158,0,0,95d9ce829a91f171649545534b80b43680e23fd13b3b02f53cdc5be44785afcc,2024-10-25T16:30:09.927000 @@ -281727,6 +281729,7 @@ CVE-2025-1302,0,0,4c600c674f22378513ee28ce145975f04e5b0e89605ff80d937b77394d750b CVE-2025-1306,0,0,de526cacf8bf273c9432977eceb9f985b41588e9255fe87d024d0d9921890929,2025-03-05T18:45:32.943000 CVE-2025-1307,0,0,f5a65a0d70e64918e5c1a7d1d02a502ae3db9a76fffe081c38f2a5d059c1eb26,2025-03-05T13:55:29.927000 CVE-2025-1309,0,0,5d2b17215fed7de1b66f6e9e5fd86a1c64bff76093266d0c2270f4eeb2161dcf,2025-03-07T08:15:42.017000 +CVE-2025-1310,1,1,1c2d4505468bb908c19a864be72e2bdc6591212daaa3ccd957c82c76cf5add42,2025-03-26T10:15:14.653000 CVE-2025-1311,0,0,f6c7853d29144d30e1440fe649502c47ee37834c55b5d3f4a34600897bc61e58,2025-03-22T07:15:24.433000 CVE-2025-1314,0,0,bafad489ff1eadbb41395d6cf3743ce464b25bb7da82ca4e71ee61d8353e849a,2025-03-20T06:15:22.437000 CVE-2025-1315,0,0,b2e5cb43d68af8915879a41f899eac8effc6f5ff149f94a7a5bed3683712a9b7,2025-03-13T15:00:51.697000 @@ -281812,6 +281815,9 @@ CVE-2025-1433,0,0,e4257b265cb0fea8237bfb54d6e25ede0c1cfc291c5042720840e13d6e6532 CVE-2025-1434,0,0,a3866a08b633baa47e1218d0ddb17df7ba7c9c2875011d0577de1d45619f3f98,2025-03-11T08:15:11.207000 CVE-2025-1435,0,0,3d678d6656d20bd5b96aa1f5dc812b5bfdb1816c9aa05dbe2ea5cdc48474d52d,2025-03-05T09:15:10.267000 CVE-2025-1436,0,0,4fd0b2ae4e724dd49b85592d1f1318f63e647837cea49133222d911b8ad33afb,2025-03-14T17:15:50.623000 +CVE-2025-1437,1,1,610ca7c6cf1b368f3c3f53bf779c4a7873ca78594266c672ccc74608f565b282,2025-03-26T10:15:14.930000 +CVE-2025-1439,1,1,82de4c165e0d3a974cd52a4f26dd6930a7722b80c168da8c08aa1030fe8ca941,2025-03-26T10:15:15.093000 +CVE-2025-1440,1,1,06b88c7fde36b7ffcfe9911908004dac3275c432076f3b7c82ff61018f56ac14,2025-03-26T10:15:15.260000 CVE-2025-1441,0,0,2d81c29ba90afc9b9a305ea2ed689bb369bca8be1da9da1458054db63323a34f,2025-02-28T19:51:28.980000 CVE-2025-1445,0,0,6a5f20112b988cc2c3d237b320d17b66c82196c854c54237efd1d40ed57525d2,2025-03-25T13:15:40.347000 CVE-2025-1446,0,0,95901e0cac0119ec391ef035d23ba55e02dd62d2391e09d32f36b0377dc79fe8,2025-03-24T19:15:49.973000 @@ -281855,6 +281861,7 @@ CVE-2025-1509,0,0,dd42a33d90057770cc0fff8a787b9ce6f9b83b6dcef0adadc46d0dded06e7a CVE-2025-1510,0,0,908b98a8ee37341a28713a06694a08e53c25ab91ce664e9dcc93619135ea532a,2025-03-06T15:13:33.280000 CVE-2025-1511,0,0,1c181a66cf1ac99d67fff65c89ad0c75490b829a67e03df0160cb907d2bc8f45,2025-03-06T17:55:34.303000 CVE-2025-1513,0,0,ce3139c624bf0aef8e367fe572f1b2e77a39780d5752c990d66c97a9a157ed49,2025-03-06T17:55:57.117000 +CVE-2025-1514,1,1,0d1793603f6cba59dc27aeba05d9e383115c690b54a3f0733d6de98099924107,2025-03-26T09:15:15.950000 CVE-2025-1515,0,0,96efd86c5199277c649db9d3a44020b0cf7829d395d3a3db8805b6323baa5417,2025-03-05T10:15:19.850000 CVE-2025-1517,0,0,59f92391aff92edb8f0e2c5d447824bc758e9021eff4b28d2fd46f3db7241347,2025-03-24T17:56:06.763000 CVE-2025-1526,0,0,6ccdbe928ef24ca526e4b1e5e42bcc074377bcc67cdebc47d468f5396b2349da,2025-03-24T18:04:40.790000 @@ -281977,6 +281984,7 @@ CVE-2025-1693,0,0,7ebc617b821b94f1ea8c04b23cc41634822af607e5925c55616ab5694b115f CVE-2025-1695,0,0,cbf3efd6d4e73bfe3ff835fcf882f73adfdb39988dff2937e451b5c5884a1eaa,2025-03-05T15:19:14.313000 CVE-2025-1696,0,0,a4ebe2093d6db003a81772653e3b8096038d292b86e17d8021513423bef33f12,2025-03-06T12:15:36.293000 CVE-2025-1702,0,0,8350c512bb427a18e75fe369e7c514680d305e4b55cc00b262ae74877fe4e9d9,2025-03-05T12:15:35.420000 +CVE-2025-1703,1,1,bef1b8ee325e662be521ba36b3069d0bb842015c7226b0ff5fecedf73b37bfc1,2025-03-26T10:15:15.437000 CVE-2025-1707,0,0,eb806af042366277371dce5ba4e4d20eb3821597874c2eb4040b48171f171ef9,2025-03-11T22:15:12.583000 CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000 CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000 @@ -282193,6 +282201,7 @@ CVE-2025-20075,0,0,d1a101f734614c5c8c3625d1b34c0ffc62ba95c1554396b4b462975c1a68b CVE-2025-20081,0,0,abcfce6f9eaab6cfa483ac5a94822b346d626721da33852cd21d93971e9a065d,2025-03-04T19:10:41.293000 CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000 CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000 +CVE-2025-2009,1,1,13f4089f3ceb3ac83cf8a3db17b37031a204a5438f304e4f0b081cf128a2de73,2025-03-26T09:15:16.140000 CVE-2025-20091,0,0,0cdb9eea19c09be50063181dcf3e2d9657e09008131c8aa6c7ec3cb8d1eff20b,2025-03-06T18:07:00.587000 CVE-2025-20094,0,0,cc9826181bf1f83e2cac160833fefdc5cca091c7fe9a0c6abd476a3468c0bc65,2025-02-06T08:15:29.837000 CVE-2025-20097,0,0,44f65a5475190446e165a44597504f8f11f3d766148b58ad519cc1d02d7b02f9,2025-02-12T22:15:41.850000 @@ -282870,6 +282879,7 @@ CVE-2025-21666,0,0,09a887db3b9a7f1ff5a317bee005091ad62ba5630ef0df2d9565a2ca4f2b4 CVE-2025-21667,0,0,1d3421162daba54a5b257dec21046c336ea4d1c2548b277380c64838560bc3f3,2025-02-03T20:00:28.727000 CVE-2025-21668,0,0,c957a19bf46951855e353bbef33bee1aaa8a5599eacf3b8f0e64afe11a44aa4a,2025-01-31T12:15:27.960000 CVE-2025-21669,0,0,f693fe3407a5a10b6015a8b5648a41115fa5f363f68427e72ac57ff90c068424,2025-02-04T15:38:39.790000 +CVE-2025-2167,1,1,a3286df3da48d881d62f74f5ff1ff40842cdbd2a36bc9d1e4b9f71244d1239bc,2025-03-26T09:15:16.500000 CVE-2025-21670,0,0,ca2de355b2236daf5daae7fbc1d2b8883b364d957a9314e913d3902bff31465c,2025-02-04T15:37:25.103000 CVE-2025-21671,0,0,56f608e264b1cd08fd32368c031880a65efd5786aa874d7df055769a8166fc98,2025-02-10T18:15:35.147000 CVE-2025-21672,0,0,cab58e2d04d760da852a8245246140e438babd82d5c91b36a25530a9eb3934b5,2025-02-03T20:04:22.147000 @@ -283352,6 +283362,7 @@ CVE-2025-22564,0,0,c6bcdc2f84aa39c7ba65ae760aaf069d1367d782297729876d0295b371334 CVE-2025-22567,0,0,7640327e90d13935406fda5e46326035dce8768c7ac08f762a301197dc23d3c0,2025-01-13T14:15:11.460000 CVE-2025-22568,0,0,f3a337c9bc58a10967a71c972b3d36d20f02e69abf28f2da99dbae5c50742b4f,2025-01-13T14:15:11.610000 CVE-2025-22569,0,0,71c2a126896a25500ec5a83e43acb4e704a716153f97fc1411303eae2fdb9009,2025-01-13T14:15:11.787000 +CVE-2025-2257,1,1,b906a9d340289263acf545d84013f0f8e6b13bfc29e21a8b02f585ced44c6360,2025-03-26T09:15:16.647000 CVE-2025-22570,0,0,81e63174bbd9a8d7742f7e13c0c424e4e252c599a54eb0b708c66a7dc1c203c0,2025-01-13T14:15:11.940000 CVE-2025-22571,0,0,589592d19e0408795b9c88db00be613623e0a28c0ced64bee3ab080db5508985,2025-01-07T16:15:53.187000 CVE-2025-22572,0,0,09d362e6905110bf03efd8d9b3422685fc5a6f559575660b2f11c273a0d7b10c,2025-01-07T16:15:53.357000