Iqonic

Kivicare

10 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.21%
  • Veröffentlicht 28.02.2025 08:15:35
  • Zuletzt bearbeitet 06.03.2025 16:36:54

The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the ‘u_id’ parameter in all versions up to, and including, 3.6.7 due to insufficient escaping on the user supplied parameter and lack of s...

  • EPSS 0.33%
  • Veröffentlicht 06.12.2024 11:15:08
  • Zuletzt bearbeitet 05.02.2025 14:41:42

The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'sort[]' parameter of the static_data_list AJAX action in all versions up to, and including, 3.6.4 due to insufficient escaping on the...

  • EPSS 0.52%
  • Veröffentlicht 06.12.2024 11:15:07
  • Zuletzt bearbeitet 05.02.2025 14:43:07

The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'service_list[0][service_id]' parameter of the get_widget_payment_options AJAX action in all versions up to, and including, 3.6.4 due ...

  • EPSS 59.76%
  • Veröffentlicht 06.12.2024 10:15:05
  • Zuletzt bearbeitet 05.02.2025 14:43:45

The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'visit_type[service_id]' parameter of the tax_calculated_data AJAX action in all versions up to, and including, 3.6.4 due to insuffici...

  • EPSS 0.07%
  • Veröffentlicht 08.06.2024 16:15:09
  • Zuletzt bearbeitet 26.11.2024 16:33:20

Authorization Bypass Through User-Controlled Key vulnerability in KiviCare.This issue affects KiviCare: from n/a through 3.6.2.

Exploit
  • EPSS 9.73%
  • Veröffentlicht 27.06.2023 14:15:11
  • Zuletzt bearbeitet 21.11.2024 07:58:57

The KiviCare WordPress plugin before 3.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrator

Exploit
  • EPSS 0.06%
  • Veröffentlicht 27.06.2023 14:15:11
  • Zuletzt bearbeitet 21.11.2024 07:58:57

The KiviCare WordPress plugin before 3.2.1 does not have proper CSRF and authorisation checks in various AJAX actions, allowing any authenticated users, such as subscriber to call them. Attacks include but are not limited to: Add arbitrary Clinic Adm...

Exploit
  • EPSS 0.14%
  • Veröffentlicht 27.06.2023 14:15:11
  • Zuletzt bearbeitet 21.11.2024 07:58:57

The KiviCare WordPress plugin before 3.2.1 does not have CSRF checks (either flawed or missing completely) in various AJAX actions, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks. This includes, but is n...

Exploit
  • EPSS 0.28%
  • Veröffentlicht 27.06.2023 14:15:10
  • Zuletzt bearbeitet 21.11.2024 07:58:57

The KiviCare WordPress plugin before 3.2.1 does not restrict the information returned in a response and returns all user data, allowing low privilege users such as subscriber to retrieve sensitive information such as the user email and hashed passwor...

Exploit
  • EPSS 66.64%
  • Veröffentlicht 13.06.2022 13:15:10
  • Zuletzt bearbeitet 21.11.2024 06:39:23

The KiviCare WordPress plugin before 2.3.9 does not sanitise and escape some parameters before using them in SQL statements via the ajax_post AJAX action with the get_doctor_details route, leading to SQL Injections exploitable by unauthenticated user...