CVE-2024-2018
- EPSS 0.4%
- Veröffentlicht 09.04.2024 19:15:24
- Zuletzt bearbeitet 06.05.2025 15:56:13
The WP Activity Log Premium plugin for WordPress is vulnerable to SQL Injection via the entry->roles parameter in all versions up to, and including, 4.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation ...
CVE-2023-2286
- EPSS 0.07%
- Veröffentlicht 09.06.2023 13:15:10
- Zuletzt bearbeitet 21.11.2024 07:58:18
The WP Activity Log for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_run_cleanup function. This makes it possible for unauthenticated a...
CVE-2023-2261
- EPSS 0.14%
- Veröffentlicht 09.06.2023 13:15:09
- Zuletzt bearbeitet 21.11.2024 07:58:15
The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_ajax_call function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with subscr...
CVE-2023-2284
- EPSS 0.07%
- Veröffentlicht 09.06.2023 13:15:09
- Zuletzt bearbeitet 21.11.2024 07:58:18
The WP Activity Log Premium plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_switch_db function in versions up to, and including, 4.5.0. This makes it possible for authenticated att...
CVE-2023-2285
- EPSS 0.05%
- Veröffentlicht 09.06.2023 13:15:09
- Zuletzt bearbeitet 21.11.2024 07:58:18
The WP Activity Log Premium plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_switch_db function. This makes it possible for unau...
CVE-2020-36716
- EPSS 0.09%
- Veröffentlicht 07.06.2023 02:15:11
- Zuletzt bearbeitet 21.11.2024 05:30:08
The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the setup_page function in versions up to, and including, 4.0.1. This makes it possible for unauthenticated attackers to run the setup...