Filtered by vendor Yaycommerce Subscriptions
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-7257 1 Yaycommerce 1 Yayextra 2024-08-05 9.8 Critical
The YayExtra – WooCommerce Extra Product Options plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_upload_file function in all versions up to, and including, 1.3.7. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVE-2022-2370 1 Yaycommerce 1 Yaysmtp 2024-08-03 6.5 Medium
The YaySMTP WordPress plugin before 2.2.1 does not have capability check before displaying the Mailer Credentials in JS code for the settings, allowing any authenticated users, such as subscriber to retrieve them
CVE-2022-2372 1 Yaycommerce 1 Yaysmtp 2024-08-03 4.8 Medium
The YaySMTP WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)
CVE-2022-2371 1 Yaycommerce 1 Yaysmtp 2024-08-03 5.4 Medium
The YaySMTP WordPress plugin before 2.2.1 does not have proper authorisation when saving its settings, allowing users with a role as low as subscriber to change them, and use that to conduct Stored Cross-Site Scripting attack due to the lack of escaping in them as well.
CVE-2022-2369 1 Yaycommerce 1 Yaysmtp 2024-08-03 4.3 Medium
The YaySMTP WordPress plugin before 2.2.1 does not have capability check in an AJAX action, allowing any logged in users, such as subscriber to view the Logs of the plugin
CVE-2023-3093 1 Yaycommerce 1 Yaysmtp 2024-08-02 7.2 High
The YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email contents in versions up to, and including, 2.4.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.