Filtered by vendor Squirrly
Subscriptions
Filtered by product Seo Plugin By Squirrly Seo
Subscriptions
Total
6 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2024-10515 | 1 Squirrly | 1 Seo Plugin By Squirrly Seo | 2024-11-21 | 3.5 Low |
In the process of testing the SEO Plugin by Squirrly SEO WordPress plugin before 12.3.21, a vulnerability was found that allows you to implement Stored XSS on behalf of the editor by embedding malicious script, which entails account takeover backdoor | ||||
CVE-2024-0597 | 1 Squirrly | 1 Seo Plugin By Squirrly Seo | 2024-11-21 | 4.4 Medium |
The SEO Plugin by Squirrly SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to and including 12.3.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | ||||
CVE-2023-50854 | 1 Squirrly | 1 Seo Plugin By Squirrly Seo | 2024-11-21 | 7.6 High |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Squirrly Squirrly SEO - Advanced Pack.This issue affects Squirrly SEO - Advanced Pack: from n/a through 2.3.8. | ||||
CVE-2022-45065 | 1 Squirrly | 1 Seo Plugin By Squirrly Seo | 2024-11-21 | 7.1 High |
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Squirrly SEO Plugin by Squirrly SEO plugin <= 12.1.20 versions. | ||||
CVE-2022-38140 | 1 Squirrly | 1 Seo Plugin By Squirrly Seo | 2024-11-21 | 7.6 High |
Auth. (contributor+) Arbitrary File Upload in SEO Plugin by Squirrly SEO plugin <= 12.1.10 on WordPress. | ||||
CVE-2021-25019 | 1 Squirrly | 1 Seo Plugin By Squirrly Seo | 2024-11-21 | 6.1 Medium |
The SEO Plugin by Squirrly SEO WordPress plugin before 11.1.12 does not escape the type parameter before outputting it back in an attribute in an admin page, leading to a Reflected Cross-Site Scripting |
Page 1 of 1.