Filtered by vendor Collne
Subscriptions
Filtered by product Welcart E-commerce
Subscriptions
Total
25 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-6120 | 1 Collne | 1 Welcart E-commerce | 2024-10-09 | 4.1 Medium |
The Welcart e-Commerce plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.9.6 via the upload_certificate_file function. This makes it possible for administrators to upload .pem or .crt files to arbitrary locations on the server. | ||||
CVE-2023-41233 | 1 Collne | 1 Welcart E-commerce | 2024-09-24 | 6.1 Medium |
Cross-site scripting vulnerability in Item List page registration process of Welcart e-Commerce versions 2.7 to 2.8.21 allows a remote unauthenticated attacker to inject an arbitrary script. | ||||
CVE-2023-41962 | 1 Collne | 1 Welcart E-commerce | 2024-09-24 | 6.1 Medium |
Cross-site scripting vulnerability in Credit Card Payment Setup page of Welcart e-Commerce versions 2.7 to 2.8.21 allows a remote unauthenticated attacker to inject an arbitrary script in the page. | ||||
CVE-2023-43484 | 1 Collne | 1 Welcart E-commerce | 2024-09-24 | 6.1 Medium |
Cross-site scripting vulnerability in Item List page of Welcart e-Commerce versions 2.7 to 2.8.21 allows a remote unauthenticated attacker to inject an arbitrary script. | ||||
CVE-2023-43493 | 1 Collne | 1 Welcart E-commerce | 2024-09-24 | 4.9 Medium |
SQL injection vulnerability in Item List page of Welcart e-Commerce versions 2.7 to 2.8.21 allows a user with author or higher privilege to obtain sensitive information. | ||||
CVE-2023-43614 | 1 Collne | 1 Welcart E-commerce | 2024-09-24 | 6.1 Medium |
Cross-site scripting vulnerability in Order Data Edit page of Welcart e-Commerce versions 2.7 to 2.8.21 allows a remote unauthenticated attacker to inject an arbitrary script. | ||||
CVE-2023-40219 | 2 Coline, Collne | 2 Welcart E-commerce, Welcart E-commerce | 2024-09-24 | 7.2 High |
Welcart e-Commerce versions 2.7 to 2.8.21 allows a user with editor or higher privilege to upload an arbitrary file to an unauthorized directory. | ||||
CVE-2023-43610 | 1 Collne | 1 Welcart E-commerce | 2024-09-24 | 8.8 High |
SQL injection vulnerability in Order Data Edit page of Welcart e-Commerce versions 2.7 to 2.8.21 allows a user with editor (without setting authority) or higher privilege to perform unintended database operations. | ||||
CVE-2022-41840 | 1 Collne | 1 Welcart E-commerce | 2024-09-16 | 7.5 High |
Unauth. Directory Traversal vulnerability in Welcart eCommerce plugin <= 2.7.7 on WordPress. | ||||
CVE-2023-50847 | 1 Collne | 1 Welcart E-commerce | 2024-09-09 | 7.6 High |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Collne Inc. Welcart e-Commerce.This issue affects Welcart e-Commerce: from n/a through 2.9.3. | ||||
CVE-2016-4826 | 1 Collne | 1 Welcart E-commerce | 2024-08-06 | 6.1 Medium |
Cross-site scripting (XSS) vulnerability in the Collne Welcart e-Commerce plugin before 1.8.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016-4827. | ||||
CVE-2016-4825 | 1 Collne | 1 Welcart E-commerce | 2024-08-06 | 5.6 Medium |
The Collne Welcart e-Commerce plugin before 1.8.3 for WordPress allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via crafted serialized data. | ||||
CVE-2016-4827 | 1 Collne | 1 Welcart E-commerce | 2024-08-06 | 6.1 Medium |
Cross-site scripting (XSS) vulnerability in the Collne Welcart e-Commerce plugin before 1.8.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016-4826. | ||||
CVE-2016-4828 | 1 Collne | 1 Welcart E-commerce | 2024-08-06 | 6.5 Medium |
The Collne Welcart e-Commerce plugin before 1.8.3 for WordPress mishandles sessions, which allows remote attackers to obtain access by leveraging knowledge of the e-mail address associated with an account. | ||||
CVE-2020-28339 | 1 Collne | 1 Welcart E-commerce | 2024-08-04 | 7.5 High |
The usc-e-shop (aka Collne Welcart e-Commerce) plugin before 1.9.36 for WordPress allows Object Injection because of usces_unserialize. There is not a complete POP chain. | ||||
CVE-2021-4375 | 1 Collne | 1 Welcart E-commerce | 2024-08-03 | 4.3 Medium |
The Welcart e-Commerce plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the usces_download_system_information() function in versions up to, and including, 2.2.7. This makes it possible for authenticated attackers to download information including WordPress settings, plugin settings, PHP settings and server settings. | ||||
CVE-2021-4355 | 1 Collne | 1 Welcart E-commerce | 2024-08-03 | 7.5 High |
The Welcart e-Commerce plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the download_orderdetail_list(), change_orderlist(), and download_member_list() functions called via admin_init hooks in versions up to, and including, 2.2.7. This makes it possible for unauthenticated attackers to download lists of members, products and orders. | ||||
CVE-2022-4655 | 1 Collne | 1 Welcart E-commerce | 2024-08-03 | 5.4 Medium |
The Welcart e-Commerce WordPress plugin before 2.8.9 does not validate and escapes one of its shortcode attributes, which could allow users with a role as low as a contributor to perform a Stored Cross-Site Scripting attack. | ||||
CVE-2022-4237 | 1 Collne | 1 Welcart E-commerce | 2024-08-03 | 8.8 High |
The Welcart e-Commerce WordPress plugin before 2.8.6 does not validate user input before using it in file_exist() functions via various AJAX actions available to any authenticated users, which could allow users with a role as low as subscriber to perform PHAR deserialisation when they can upload a file and a suitable gadget chain is present on the blog | ||||
CVE-2022-4236 | 1 Collne | 1 Welcart E-commerce | 2024-08-03 | 6.5 Medium |
The Welcart e-Commerce WordPress plugin before 2.8.5 does not validate user input before using it to output the content of a file via an AJAX action available to any authenticated users, which could allow users with a role as low as subscriber to read arbitrary files on the server. |