Filtered by vendor Kadencewp Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-47186 1 Kadencewp 1 Kadence Woocommerce Email Designer 2024-09-05 8.8 High
Cross-Site Request Forgery (CSRF) vulnerability in Kadence WP Kadence WooCommerce Email Designer plugin <= 1.5.11 versions.
CVE-2024-6884 1 Kadencewp 1 Gutenberg Blocks With Ai 2024-08-08 5.4 Medium
The Gutenberg Blocks with AI by Kadence WP WordPress plugin before 3.2.39 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
CVE-2022-3679 1 Kadencewp 1 Starter Templates 2024-08-03 8.8 High
The Starter Templates by Kadence WP WordPress plugin before 1.2.17 unserialises the content of an imported file, which could lead to PHP object injection issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
CVE-2022-3335 1 Kadencewp 1 Kadence Woocommerce Email Designer 2024-08-03 7.2 High
The Kadence WooCommerce Email Designer WordPress plugin before 1.5.7 unserialises the content of an imported file, which could lead to PHP object injections issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
CVE-2024-5289 1 Kadencewp 1 Gutenberg Blocks With Ai 2024-08-01 6.4 Medium
The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Google Maps widget parameters in all versions up to, and including, 3.2.42 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2024-1330 1 Kadencewp 1 Kadence Blocks Pro 2024-08-01 4.3 Medium
The kadence-blocks-pro WordPress plugin before 2.3.8 does not prevent users with at least the contributor role using some of its shortcode's functionalities to leak arbitrary options from the database.