Filtered by vendor Newsignature Subscriptions
Total 4 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-10078 2 Newsignature, Wp Easy Post Types Project 2 Wp Easy Post Types, Wp Easy Post Types 2024-10-22 7.3 High
The WP Easy Post Types plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 1.4.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to add, modify, or delete plugin options and posts.
CVE-2024-10079 2 Newsignature, Wp Easy Post Types Project 2 Wp Easy Post Types, Wp Easy Post Types 2024-10-22 8.8 High
The WP Easy Post Types plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.4.4 via deserialization of untrusted input from the 'text' parameter in the 'ajax_import_content' function. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
CVE-2024-10080 1 Newsignature 1 Wp Easy Post Types 2024-10-22 6.4 Medium
The WP Easy Post Types plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post meta in versions up to, and including, 1.4.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CVE-2014-3933 1 Newsignature 1 Addressfield Tokens 2024-08-06 N/A
Cross-site scripting (XSS) vulnerability in the address components field formatter in the AddressField Tokens module 7.x-1.x before 7.x-1.4 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via an address field.