Refine your search

2 vulnerabilities found for WordPress Popular Posts by Hector Cabrera

jvndb-2022-000091
Vulnerability from jvndb
Published
2022-11-18 15:14
Modified
2022-11-18 15:14
Severity ?
Summary
WordPress Plugin "WordPress Popular Posts" accepts untrusted external inputs to update certain internal variables
Details
WordPress Plugin "WordPress Popular Posts" provided by Hector Cabrera accepts untrusted external inputs to update certain internal variables (CWE-454). Tsubasa Iinuma of Origami Systems reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000091.html",
  "dc:date": "2022-11-18T15:14+09:00",
  "dcterms:issued": "2022-11-18T15:14+09:00",
  "dcterms:modified": "2022-11-18T15:14+09:00",
  "description": "WordPress Plugin \"WordPress Popular Posts\" provided by Hector Cabrera accepts untrusted external inputs to update certain internal variables (CWE-454).\r\n\r\nTsubasa Iinuma of Origami Systems reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2022/JVNDB-2022-000091.html",
  "sec:cpe": {
    "#text": "cpe:/a:wordpress_popular_posts_project:wordpress_popular_posts",
    "@product": "WordPress Popular Posts",
    "@vendor": "Hector Cabrera",
    "@version": "2.2"
  },
  "sec:cvss": [
    {
      "@score": "5.0",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
      "@version": "2.0"
    },
    {
      "@score": "5.3",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2022-000091",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN13927745/index.html",
      "@id": "JVN#13927745",
      "@source": "JVN"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2022-43468",
      "@id": "CVE-2022-43468",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2022-43468",
      "@id": "CVE-2022-43468",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-Other",
      "@title": "No Mapping(CWE-Other)"
    }
  ],
  "title": "WordPress Plugin \"WordPress Popular Posts\" accepts untrusted external inputs to update certain internal variables"
}

jvndb-2021-000056
Vulnerability from jvndb
Published
2021-06-30 11:36
Modified
2021-06-30 11:36
Severity ?
Summary
WordPress Plugin "WordPress Popular Posts" vulnerable to cross-site scripting
Details
WordPress Plugin "WordPress Popular Posts" provided by Hector Cabrera contains a cross-site scripting vulnerability (CWE-79). Yu Iwama of Secure Sky Technology Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000056.html",
  "dc:date": "2021-06-30T11:36+09:00",
  "dcterms:issued": "2021-06-30T11:36+09:00",
  "dcterms:modified": "2021-06-30T11:36+09:00",
  "description": "WordPress Plugin \"WordPress Popular Posts\" provided by Hector Cabrera contains a cross-site scripting vulnerability (CWE-79).\r\n\r\nYu Iwama of Secure Sky Technology Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2021/JVNDB-2021-000056.html",
  "sec:cpe": {
    "#text": "cpe:/a:wordpress_popular_posts_project:wordpress_popular_posts",
    "@product": "WordPress Popular Posts",
    "@vendor": "Hector Cabrera",
    "@version": "2.2"
  },
  "sec:cvss": [
    {
      "@score": "3.5",
      "@severity": "Low",
      "@type": "Base",
      "@vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
      "@version": "2.0"
    },
    {
      "@score": "5.4",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
      "@version": "3.0"
    }
  ],
  "sec:identifier": "JVNDB-2021-000056",
  "sec:references": [
    {
      "#text": "https://jvn.jp/en/jp/JVN63066062/index.html",
      "@id": "JVN#63066062",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20746",
      "@id": "CVE-2021-20746",
      "@source": "CVE"
    },
    {
      "#text": "https://nvd.nist.gov/vuln/detail/CVE-2021-20746",
      "@id": "CVE-2021-20746",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-79",
      "@title": "Cross-site Scripting(CWE-79)"
    }
  ],
  "title": "WordPress Plugin \"WordPress Popular Posts\" vulnerable to cross-site scripting"
}