Vulnerabilities (CVE)

Filtered by vendor Motopress Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-6042 1 Motopress 1 Getwid - Gutenberg Blocks 2024-01-11 N/A 7.5 HIGH
Any unauthenticated user may send e-mail from the site with any title or content to the admin
CVE-2023-5991 1 Motopress 1 Hotel Booking Lite 2024-01-02 N/A 9.8 CRITICAL
The Hotel Booking Lite WordPress plugin before 4.8.5 does not validate file paths provided via user input, as well as does not have proper CSRF and authorisation checks, allowing unauthenticated users to download and delete arbitrary files on the server
CVE-2023-48756 1 Motopress 1 Jetblocks For Elementor 2023-12-18 N/A 6.1 MEDIUM
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetBlocks For Elementor allows Reflected XSS.This issue affects JetBlocks For Elementor: from n/a through 1.3.8.
CVE-2023-28498 1 Motopress 1 Hotel Booking Lite 2023-11-15 N/A 8.8 HIGH
Cross-Site Request Forgery (CSRF) vulnerability in MotoPress Hotel Booking Lite plugin <= 4.6.0 versions.
CVE-2021-24584 1 Motopress 1 Timetable And Event Schedule 2022-07-29 3.5 LOW 5.4 MEDIUM
The Timetable and Event Schedule WordPress plugin before 2.4.2 does not have proper access control when updating a timeslot, allowing any user with the edit_posts capability (contributor+) to update arbitrary timeslot from any events. Furthermore, no CSRF check is in place as well, allowing such attack to be perform via CSRF against a logged in with such capability. In versions before 2.3.19, the lack of sanitisation and escaping in some of the fields, like the descritption could also lead to Stored XSS issues
CVE-2021-24722 1 Motopress 1 Restaurant Menu 2021-11-30 3.5 LOW 4.8 MEDIUM
The Restaurant Menu by MotoPress WordPress plugin before 2.4.2 does not properly sanitize or escape inputs when creating new menu items, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed
CVE-2021-24544 1 Motopress 1 Motopress-slider-lite 2021-10-28 3.5 LOW 5.4 MEDIUM
The Responsive WordPress Slider WordPress plugin through 2.2.0 does not sanitise and escape some of the Slider options, allowing Cross-Site Scripting payloads to be set in them. Furthermore, as by default any authenticated user is allowed to create Sliders (https://wordpress.org/support/topic/slider-can-be-changed-from-any-user-even-subscriber/, such settings can be changed in the plugin's settings), this would allow user with a role as low as subscriber to perform Cross-Site Scripting attacks against logged in admins viewing the slider list and could lead to privilege escalation by creating a rogue admin account for example.
CVE-2021-24585 1 Motopress 1 Timetable And Event Schedule 2021-10-01 4.0 MEDIUM 6.5 MEDIUM
The Timetable and Event Schedule WordPress plugin before 2.4.0 outputs the Hashed Password, Username and Email Address (along other less sensitive data) of the user related to the Even Head of the Timeslot in the response when requesting the event Timeslot data with a user with the edit_posts capability. Combined with the other Unauthorised Event Timeslot Modification issue (https://wpscan.com/reports/submissions/4699/) where an arbitrary user ID can be set, this could allow low privilege users with the edit_posts capability (such as author) to retrieve sensitive User data by iterating over the user_id
CVE-2021-24583 1 Motopress 1 Timetable And Event Schedule 2021-10-01 4.3 MEDIUM 4.3 MEDIUM
The Timetable and Event Schedule WordPress plugin before 2.4.2 does not have proper access control when deleting a timeslot, allowing any user with the edit_posts capability (contributor+) to delete arbitrary timeslot from any events. Furthermore, no CSRF check is in place as well, allowing such attack to be performed via CSRF against a logged in with such capability
CVE-2021-24724 1 Motopress 1 Timetable And Event Schedule 2021-09-23 3.5 LOW 5.4 MEDIUM
The Timetable and Event Schedule by MotoPress WordPress plugin before 2.3.19 does not sanitise some of its parameters, which could allow low privilege users such as author to perform XSS attacks against frontend and backend users when viewing the related event/s