Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Wp_editor
(Benjaminrojas)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-01-16 | CVE-2021-24151 | The WP Editor WordPress plugin before 1.2.7 did not sanitise or validate its setting fields leading to an authenticated (admin+) blind SQL injection issue via an arbitrary parameter when making a request to save the settings. | Wp_editor | 7.2 | ||
2024-09-13 | CVE-2022-2446 | The WP Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'current_theme_root' parameter in versions up to, and including 1.2.9. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a... | Wp_editor | 7.2 | ||
2019-08-14 | CVE-2016-10885 | The wp-editor plugin before 1.2.6 for WordPress has CSRF. | Wp_editor | 8.8 | ||
2019-08-14 | CVE-2016-10886 | The wp-editor plugin before 1.2.6 for WordPress has incorrect permissions. | Wp_editor | 9.8 |