Filtered by vendor Metagauss
Subscriptions
Filtered by product Profilegrid
Subscriptions
Total
16 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-10900 | 1 Metagauss | 1 Profilegrid | 2024-11-29 | 6.5 Medium |
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pm_remove_file_attachment() function in all versions up to, and including, 5.9.3.6. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary user meta which can do things like deny an administrator's access to their site. . | ||||
CVE-2024-5453 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 4.3 Medium |
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pm_dismissible_notice and pm_wizard_update_group_icon functions in all versions up to, and including, 5.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary options to the value '1' or change group icons. | ||||
CVE-2023-52117 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 4.3 Medium |
Missing Authorization vulnerability in Metagauss ProfileGrid.This issue affects ProfileGrid: from n/a through 5.6.6. | ||||
CVE-2023-47644 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 5.4 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in profilegrid ProfileGrid – User Profiles, Memberships, Groups and Communities.This issue affects ProfileGrid – User Profiles, Memberships, Groups and Communities: from n/a through 5.6.6. | ||||
CVE-2023-3714 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 7.5 High |
The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'edit_group' handler in versions up to, and including, 5.5.2. This makes it possible for authenticated attackers, with group ownership, to update group options, including the 'associate_role' parameter, which defines the member's role. This issue was partially patched in version 5.5.2 preventing privilege escalation, however, it was fully patched in 5.5.3. | ||||
CVE-2023-3713 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 8.8 High |
The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'profile_magic_check_smtp_connection' function in versions up to, and including, 5.5.1. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update the site options arbitrarily. This can be used by attackers to achieve privilege escalation. | ||||
CVE-2023-3404 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 4.9 Medium |
The ProfileGrid plugin for WordPress is vulnerable to unauthorized decryption of private information in versions up to, and including, 5.5.0. This is due to the passphrase and iv being hardcoded in the 'pm_encrypt_decrypt_pass' function and used across all sites running the plugin. This makes it possible for authenticated attackers, with administrator-level permissions or above to decrypt and view users' passwords. If combined with another vulnerability, this can potentially grant lower-privileged users access to users' passwords. | ||||
CVE-2023-3403 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 5.4 Medium |
The ProfileGrid plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pm_upload_csv' function in versions up to, and including, 5.5.1. This makes it possible for authenticated attackers, with subscriber-level permissions or above to import new users and update existing users. | ||||
CVE-2023-0940 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 8.8 High |
The ProfileGrid WordPress plugin before 5.3.1 provides an AJAX endpoint for resetting a user password but does not implement proper authorization. This allows a user with low privileges, such as subscriber, to change the password of any account, including Administrator ones. | ||||
CVE-2022-41791 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 6.5 Medium |
Auth. (subscriber+) CSV Injection vulnerability in ProfileGrid plugin <= 5.1.6 on WordPress. | ||||
CVE-2022-3578 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 6.1 Medium |
The ProfileGrid WordPress plugin before 5.1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting | ||||
CVE-2022-36352 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 6.3 Medium |
Missing Authorization vulnerability in Profilegrid ProfileGrid – User Profiles, Memberships, Groups and Communities.This issue affects ProfileGrid – User Profiles, Memberships, Groups and Communities: from n/a through 5.0.3. | ||||
CVE-2022-0233 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | 6.4 Medium |
The ProfileGrid – User Profiles, Memberships, Groups and Communities WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient escaping via the pm_user_avatar and pm_cover_image parameters found in the ~/admin/class-profile-magic-admin.php file which allows attackers with authenticated user access, such as subscribers, to inject arbitrary web scripts into their profile, in versions up to and including 1.2.7. | ||||
CVE-2019-15873 | 1 Metagauss | 1 Profilegrid | 2024-11-21 | N/A |
The profilegrid-user-profiles-groups-and-communities plugin before 2.8.6 for WordPress has remote code execution via an wp-admin/admin-ajax.php request with the action=pm_template_preview&html=<?php substring followed by PHP code. | ||||
CVE-2024-49273 | 1 Metagauss | 1 Profilegrid | 2024-10-29 | 4.3 Medium |
Missing Authorization vulnerability in ProfileGrid User Profiles ProfileGrid.This issue affects ProfileGrid: from n/a through 5.9.3. | ||||
CVE-2024-8861 | 1 Metagauss | 1 Profilegrid | 2024-10-01 | 6.4 Medium |
The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 5.9.3.2 due to incorrect use of the wp_kses_allowed_html function, which allows the 'onclick' attribute for certain HTML elements without sufficient restriction or context validation. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. |
Page 1 of 1.