CVE-2024-2018
- EPSS 0.55%
- Veröffentlicht 09.04.2024 19:15:24
- Zuletzt bearbeitet 08.04.2026 17:18:28
The WP Activity Log Premium plugin for WordPress is vulnerable to SQL Injection via the entry->roles parameter in all versions up to, and including, 4.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation ...
CVE-2023-2286
- EPSS 0.1%
- Veröffentlicht 09.06.2023 13:15:10
- Zuletzt bearbeitet 08.04.2026 19:18:13
The WP Activity Log for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_run_cleanup function. This makes it possible for unauthenticated a...
CVE-2023-2261
- EPSS 0.17%
- Veröffentlicht 09.06.2023 13:15:09
- Zuletzt bearbeitet 08.04.2026 19:18:13
The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_ajax_call function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with subscr...
CVE-2023-2284
- EPSS 0.09%
- Veröffentlicht 09.06.2023 13:15:09
- Zuletzt bearbeitet 08.04.2026 18:17:59
The WP Activity Log Premium plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_switch_db function in versions up to, and including, 4.5.0. This makes it possible for authenticated att...
CVE-2023-2285
- EPSS 0.07%
- Veröffentlicht 09.06.2023 13:15:09
- Zuletzt bearbeitet 08.04.2026 18:17:59
The WP Activity Log Premium plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_switch_db function. This makes it possible for unau...
CVE-2020-36716
- EPSS 0.11%
- Veröffentlicht 07.06.2023 02:15:11
- Zuletzt bearbeitet 08.04.2026 18:17:09
The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the setup_page function in versions up to, and including, 4.0.1. This makes it possible for unauthenticated attackers to run the setup...