Filtered by vendor Stylemixthemes
Subscriptions
Filtered by product Ulisting
Subscriptions
Total
17 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2021-4381 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 9.8 Critical |
The uListing plugin for WordPress is vulnerable to authorization bypass via wp_route due to missing capability checks, and a missing security nonce, in the StmListingSingleLayout::import_new_layout method in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to change any WordPress option in the database. | ||||
CVE-2021-4370 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 9.8 Critical |
The uListing plugin for WordPress is vulnerable to authorization bypass as most actions and endpoints are accessible to unauthenticated users, lack security nonces, and data is seldom validated. This issue exists in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to conduct numerous administrative actions, including those less critical than the explicitly outlined ones in our detection. | ||||
CVE-2021-4357 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 9.1 Critical |
The uListing plugin for WordPress is vulnerable to authorization bypass due to missing capability checks, and a missing security nonce, on the UlistingUserRole::save_role_api function in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to arbitrarily delete site posts and pages. | ||||
CVE-2021-4346 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 9.8 Critical |
The uListing plugin for WordPress is vulnerable to Unauthenticated Arbitrary Account Changes in versions up to, and including, 1.6.6. This is due to missing login checks on the stm_listing_profile_edit AJAX action. This makes it possible for unauthenticated attackers to edit any account on the blog, such as changing the admin account's email address. | ||||
CVE-2021-4345 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 6.5 Medium |
The uListing plugin for WordPress is vulnerable to authorization bypass due to missing capability and nonce checks on the UlistingUserRole::save_role_api method in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to remove or add roles, and add capabilities. | ||||
CVE-2021-4343 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 9.8 Critical |
The Unauthenticated Account Creation plugin for WordPress is vulnerable to Unauthenticated Account Creation in versions up to, and including, 1.6.6. This is due to the stm_listing_register AJAX action function being accessible and taking roles unprotected. This makes it possible for unauthenticated attackers to create accounts, even those with administrator privileges. | ||||
CVE-2021-4341 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 9.8 Critical |
The uListing plugin for WordPress is vulnerable to authorization bypass via Ajax due to missing capability checks, missing input validation, and a missing security nonce in the stm_update_email_data AJAX action in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to change any WordPress option in the database. | ||||
CVE-2021-4340 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 9.8 Critical |
The uListing plugin for WordPress is vulnerable to generic SQL Injection via the ‘listing_id’ parameter in versions up to, and including, 1.6.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | ||||
CVE-2021-4339 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 7.5 High |
The uListing plugin for WordPress is vulnerable to authorization bypass due to a missing capability check in the "ulisting/includes/route.php" file on the /1/api/ulisting-user/search REST-API route in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to retrieve the list of all users and their email address in the database. | ||||
CVE-2021-36880 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 8.6 High |
Unauthenticated SQL Injection (SQLi) vulnerability in WordPress uListing plugin (versions <= 2.0.3), vulnerable parameter: custom. | ||||
CVE-2021-36879 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 9.8 Critical |
Unauthenticated Privilege Escalation vulnerability in WordPress uListing plugin (versions <= 2.0.5). Possible if WordPress configuration allows user registration. | ||||
CVE-2021-36878 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 4.3 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in WordPress uListing plugin (versions <= 2.0.5) makes it possible for attackers to update settings. | ||||
CVE-2021-36877 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 4.3 Medium |
Cross-Site Request Forgery (CSRF) vulnerability in WordPress uListing plugin (versions <= 2.0.5) makes it possible for attackers to modify user roles. | ||||
CVE-2021-36876 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 5.4 Medium |
Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in WordPress uListing plugin (versions <= 2.0.5) as it lacks CSRF checks on plugin administration pages. | ||||
CVE-2021-36875 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 4.8 Medium |
Authenticated Reflected Cross-Site Scripting (XSS) vulnerability in WordPress uListing plugin (versions <= 2.0.5). Vulnerable parameters: &filter[id], &filter[user], &filter[expired_date], &filter[created_date], &filter[updated_date]. | ||||
CVE-2021-36874 | 1 Stylemixthemes | 1 Ulisting | 2024-11-21 | 7.1 High |
Authenticated Insecure Direct Object References (IDOR) vulnerability in WordPress uListing plugin (versions <= 2.0.5). | ||||
CVE-2024-47344 | 1 Stylemixthemes | 1 Ulisting | 2024-10-07 | 5.3 Medium |
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in StylemixThemes uListing.This issue affects uListing: from n/a through 2.1.5. |
Page 1 of 1.