Latest CVE Feed
-
4.3
MEDIUMCVE-2022-4103
The Royal Elementor Addons WordPress plugin before 1.3.56 does not have authorisation and CSRF checks when creating a template, and does not ensure that the post created is a template. This could allow any authenticated users, such as subscriber to create... Read more
Affected Products : royal_elementor_addons- Published: Jan. 09, 2023
- Modified: Apr. 09, 2025
-
4.3
MEDIUMCVE-2025-29606
py-libp2p before 0.2.3 allows a peer to cause a denial of service (resource consumption) via a large RSA key.... Read more
Affected Products : libp2p- Published: Jul. 14, 2025
- Modified: Jul. 15, 2025
- Vuln Type: Denial of Service
-
4.3
MEDIUMCVE-2022-3582
A vulnerability has been found in SourceCodester Simple Cold Storage Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument change password leads to cross-site requ... Read more
Affected Products : simple_cold_storage_management_system- Published: Oct. 18, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2025-54041
Cross-Site Request Forgery (CSRF) vulnerability in WP Swings Wallet System for WooCommerce allows Cross Site Request Forgery. This issue affects Wallet System for WooCommerce: from n/a through 2.6.7.... Read more
Affected Products :- Published: Jul. 16, 2025
- Modified: Jul. 16, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2022-36075
Nextcloud files access control is a nextcloud app to manage access control for files. Users with limited access can see file names in certain cases where they do not have privilege to do so. This issue has been addressed and it is recommended that the Nex... Read more
- Published: Sep. 15, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-4769
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.0 and 9.3.0.2, including 8.3.x display the target path on host when a file is uploaded with an invalid character in its name. ... Read more
- Published: Apr. 03, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-46257
An information disclosure vulnerability was identified in GitHub Enterprise Server that allowed private repositories to be added to a GitHub Actions runner group via the API by a user who did not have access to those repositories, resulting in the reposit... Read more
Affected Products : enterprise_server- Published: Mar. 07, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-2258
In affected versions of Octopus Deploy it is possible for a user to view Tagsets without being explicitly assigned permissions to view these items... Read more
Affected Products : octopus_server- Published: Mar. 13, 2023
- Modified: Feb. 27, 2025
-
4.3
MEDIUMCVE-2023-23711
Cross-Site Request Forgery (CSRF) vulnerability in A2 Hosting A2 Optimized WP plugin <= 3.0.4 versions.... Read more
Affected Products : a2_optimized- Published: Mar. 13, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2023-1844
The Subscribe2 plugin for WordPress is vulnerable to unauthorized access to email functionality due to a missing capability check when sending test emails in versions up to, and including, 10.40. This makes it possible for author-level attackers to send e... Read more
Affected Products : subscribe2- Published: Jun. 28, 2023
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2022-45072
Cross-Site Request Forgery (CSRF) vulnerability in WPML Multilingual CMS premium plugin <= 4.5.13 on WordPress.... Read more
Affected Products : wpml- Published: Nov. 17, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2025-6062
The Yougler Blogger Profile Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, v1.01. This is due to missing or incorrect nonce validation on the 'yougler-plugin.php' page. This makes it possible fo... Read more
Affected Products :- Published: Jun. 14, 2025
- Modified: Jun. 16, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-23972
Cross-Site Request Forgery (CSRF) vulnerability in Brian S. Reed Contact Form 7 reCAPTCHA allows Cross Site Request Forgery. This issue affects Contact Form 7 reCAPTCHA: from n/a through 1.2.0.... Read more
Affected Products :- Published: Jul. 04, 2025
- Modified: Jul. 08, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-47850
In JetBrains YouTrack before 2025.1.74704 restricted attachments could become visible after issue cloning... Read more
Affected Products : youtrack- Published: May. 20, 2025
- Modified: May. 21, 2025
- Vuln Type: Authorization
-
4.3
MEDIUMCVE-2022-2382
The Product Slider for WooCommerce WordPress plugin before 2.5.7 has flawed CSRF checks and lack authorisation in some of its AJAX actions, allowing any authenticated users, such as subscriber to call them. One in particular could allow them to delete arb... Read more
Affected Products : product_slider_for_woocommerce- Published: Aug. 22, 2022
- Modified: Nov. 21, 2024
-
4.3
MEDIUMCVE-2025-0796
The Mortgage Lead Capture System plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 8.2.10. This is due to missing or incorrect nonce validation on the 'wprequal_reset_defaults' action. This makes it pos... Read more
Affected Products : wprequal- Published: Feb. 18, 2025
- Modified: Feb. 21, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2025-6781
The Copymatic – AI Content Writer & Generator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1. This is due to missing or incorrect nonce validation on the 'copymatic-menu' page. This makes it poss... Read more
Affected Products : copymatic- Published: Jul. 18, 2025
- Modified: Jul. 22, 2025
- Vuln Type: Cross-Site Request Forgery
-
4.3
MEDIUMCVE-2020-23588
A vulnerability in OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to "Enable or Disable Ports" and to "Change port number" t... Read more
- Published: Nov. 23, 2022
- Modified: Apr. 25, 2025
-
4.3
MEDIUMCVE-2023-24058
Booked Scheduler 2.5.5 allows authenticated users to create and schedule events for any other user via a modified userId value to reservation_save.php. NOTE: 2.5.5 is a version from 2014; the latest version of Booked Scheduler is not affected. However, La... Read more
Affected Products : booked- Published: Jan. 22, 2023
- Modified: Apr. 02, 2025
-
4.3
MEDIUMCVE-2024-13420
Multiple plugins and/or themes for WordPress are vulnerable to unauthorized access due to a missing capability check on several AJAX actions like 'gsf_reset_section_options', 'gsf_reset_section_options', 'gsf_create_preset_options' and more in various ver... Read more
- Published: May. 02, 2025
- Modified: May. 06, 2025
- Vuln Type: Authorization