Skip to content

Commit

Permalink
Update for 2025-01-06
Browse files Browse the repository at this point in the history
Signed-off-by: Josh Bressers <[email protected]>
  • Loading branch information
joshbressers committed Jan 6, 2025
1 parent ad6350e commit c2df183
Show file tree
Hide file tree
Showing 22 changed files with 1,138 additions and 0 deletions.
46 changes: 46 additions & 0 deletions data/anchore/2024/CVE-2024-10932.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-10932",
"description": "The Backup Migration plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.6 via deserialization of untrusted input in the 'recursive_unserialize_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files, retrieve sensitive data, or execute code. An administrator must create a staging site in order to trigger the exploit.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/browser//backup-backup/tags/1.4.6/includes/database/search-replace.php#L46",
"https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.4.6.1/includes/database/search-replace.php#L46",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/d5a0c514-5200-47f4-9d2e-684d68946b9a?source=cve"
],
"upstream": {
"datePublished": "2025-01-04T07:24:24.347Z",
"dateReserved": "2024-11-06T17:21:23.499Z",
"dateUpdated": "2025-01-06T16:29:20.276Z",
"digest": "0cede2e371aad2e318ee2b3b5e7bfe8966cd05b272e942a8e5e2203b63a2fbfc"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:*"
],
"packageName": "backup-backup",
"packageType": "wordpress-plugin",
"product": "Backup Migration",
"repo": "https://plugins.svn.wordpress.org/backup-backup",
"vendor": "inisev",
"versions": [
{
"lessThan": "1.4.6.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
44 changes: 44 additions & 0 deletions data/anchore/2024/CVE-2024-11733.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-11733",
"description": "The The WordPress Popular Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 7.1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/browser/wordpress-popular-posts/tags/7.1.0/src/Rest/ViewLoggerEndpoint.php#L70",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/c38ac8d6-c6de-4be7-bf7b-198e085a0ad2?source=cve"
],
"upstream": {
"datePublished": "2025-01-03T22:22:06.377Z",
"dateReserved": "2024-11-26T01:15:41.336Z",
"dateUpdated": "2025-01-06T15:07:47.449Z",
"digest": "a8b86038c5e7b6774de380cffc657e1883be92a2a8db659521a89594fe409984"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:wordpress_popular_posts_project:wordpress_popular_posts:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wordpress-popular-posts",
"packageType": "wordpress-plugin",
"product": "WordPress Popular Posts",
"vendor": "hcabrera",
"versions": [
{
"lessThan": "7.2.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
46 changes: 46 additions & 0 deletions data/anchore/2024/CVE-2024-11930.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-11930",
"description": "The Taskbuilder – WordPress Project & Task Management plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wppm_tasks shortcode in all versions up to, and including, 3.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/browser/taskbuilder/trunk/includes/frontend/wppm_tasks_shortcode.php#L123",
"https://plugins.trac.wordpress.org/changeset/3210469/",
"https://wordpress.org/plugins/taskbuilder/#developers",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/fdc39d59-7c9d-4d5d-9fb5-b67d2324adaa?source=cve"
],
"upstream": {
"datePublished": "2025-01-04T08:22:52.348Z",
"dateReserved": "2024-11-27T19:50:06.273Z",
"dateUpdated": "2025-01-06T16:34:31.047Z",
"digest": "c924370988768be53b4cc0f358739c867893b1db70dc3a7ea54adb00ff6b1611"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:taskbuilder:taskbuilder:*:*:*:*:*:wordpress:*:*"
],
"packageName": "taskbuilder",
"packageType": "wordpress-plugin",
"product": "Taskbuilder – WordPress Project & Task Management plugin",
"vendor": "taskbuilder",
"versions": [
{
"lessThan": "3.0.7",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
49 changes: 49 additions & 0 deletions data/anchore/2024/CVE-2024-11974.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-11974",
"description": "The Media Library Assistant plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘smc_settings_tab', 'unattachfixit-action', and 'woofixit-action’ parameters in all versions up to, and including, 3.23 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/examples/plugins/mla-unattached-fixit.php#L177",
"https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/examples/plugins/smart-media-categories/admin/includes/class-smc-settings-support.php#L459",
"https://plugins.trac.wordpress.org/browser/media-library-assistant/trunk/examples/plugins/woofixit.php#L1391",
"https://plugins.trac.wordpress.org/changeset/3215759/",
"https://wordpress.org/plugins/media-library-assistant/#developers",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/65f4e5e1-4c2e-4943-aa84-4caa61e14bc2?source=cve"
],
"upstream": {
"datePublished": "2025-01-04T07:24:23.587Z",
"dateReserved": "2024-11-28T22:44:07.647Z",
"dateUpdated": "2025-01-06T16:30:23.934Z",
"digest": "92241bfc30e32bd514ef50f927de135e378d2be00f7f9b4670d11c062620e528"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:davidlingren:media_library_assistant:*:*:*:*:*:wordpress:*:*"
],
"packageName": "media-library-assistant",
"packageType": "wordpress-plugin",
"product": "Media Library Assistant",
"repo": "https://plugins.svn.wordpress.org/media-library-assistant",
"vendor": "dglingren",
"versions": [
{
"lessThan": "3.24",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
45 changes: 45 additions & 0 deletions data/anchore/2024/CVE-2024-12132.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-12132",
"description": "The WP Job Portal – A Complete Recruitment System for Company or Job Board website plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.2.4 due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create jobs for companies that are unaffiliated with the attacker.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/changeset/3210251/",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/d19ac6fc-029f-4f19-913e-e082acecc594?source=cve"
],
"upstream": {
"datePublished": "2025-01-03T08:22:21.179Z",
"dateReserved": "2024-12-04T02:48:34.516Z",
"dateUpdated": "2025-01-03T14:31:03.355Z",
"digest": "8c4277ba4f36cb9c2d657f44f068c8347d127132c1435ad2ae163f3f8f7ca30a"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-job-portal",
"packageType": "wordpress-plugin",
"product": "WP Job Portal – A Complete Recruitment System for Company or Job Board website",
"repo": "https://plugins.svn.wordpress.org/wp-job-portal",
"vendor": "wpjobportal",
"versions": [
{
"lessThan": "2.2.5",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
45 changes: 45 additions & 0 deletions data/anchore/2024/CVE-2024-12195.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-12195",
"description": "The WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts plugin for WordPress is vulnerable to SQL Injection via the 'project_id' parameter of the /wp-json/pm/v2/projects/2/task-lists REST API endpoint in all versions up to, and including, 2.6.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, who have been granted access to a project, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/browser/wedevs-project-manager/tags/2.6.14/src/Task_List/Controllers/Task_List_Controller.php#L688",
"https://plugins.trac.wordpress.org/changeset/3213295/wedevs-project-manager",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/798d120a-edec-4af9-b574-46f9beabc491?source=cve"
],
"upstream": {
"datePublished": "2025-01-04T11:24:20.388Z",
"dateReserved": "2024-12-04T17:04:14.090Z",
"dateUpdated": "2025-01-06T15:16:26.178Z",
"digest": "3c5bae41f3b1da5bcc09045cd4a9b94543f76e837c6ec5a30c6127810e038933"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:wedevs:wp_project_manager:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wedevs-project-manager",
"packageType": "wordpress-plugin",
"product": "WP Project Manager – Task, team, and project management plugin featuring kanban board and gantt charts",
"vendor": "wedevs",
"versions": [
{
"lessThan": "2.6.17",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
46 changes: 46 additions & 0 deletions data/anchore/2024/CVE-2024-12237.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-12237",
"description": "The Photo Gallery Slideshow & Masonry Tiled Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.15 via the rjg_get_youtube_info_justified_gallery_callback function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to retrieve limited information from internal services.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/browser/wp-responsive-photo-gallery/tags/1.0.15/wp-responsive-photo-gallery.php#L3023",
"https://plugins.trac.wordpress.org/browser/wp-responsive-photo-gallery/tags/1.0.15/wp-responsive-photo-gallery.php#L3044",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/08e44434-8908-4c63-9e5b-9a8b387255d9?source=cve"
],
"upstream": {
"datePublished": "2025-01-03T22:22:05.828Z",
"dateReserved": "2024-12-05T11:42:13.345Z",
"dateUpdated": "2025-01-06T15:29:01.440Z",
"digest": "b782e8ae505a22ef04ada405f31d1597b7844c53d026d61cb2515a9e476d0864"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:i13websolution:web_solution_photo_gallery_slideshow_\\&_masonry_tiled_gallery:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-responsive-photo-gallery",
"packageType": "wordpress-plugin",
"product": "Photo Gallery Slideshow & Masonry Tiled Gallery",
"repo": "https://plugins.svn.wordpress.org/wp-responsive-photo-gallery",
"vendor": "nik00726",
"versions": [
{
"lessThan": "1.0.16",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
45 changes: 45 additions & 0 deletions data/anchore/2024/CVE-2024-12279.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-12279",
"description": "The WP Social AutoConnect plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.6.2. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/changeset/3211577/",
"https://wordpress.org/plugins/wp-fb-autoconnect/#developers",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/392d8286-a5fd-4d5d-9f6a-f13564013edc?source=cve"
],
"upstream": {
"datePublished": "2025-01-04T11:16:32.714Z",
"dateReserved": "2024-12-05T19:18:52.652Z",
"dateUpdated": "2025-01-06T16:34:07.058Z",
"digest": "dabc3dbaa4a403b925fdadb7833811b7c71865f93198446e7e8ce6b0b0ca9532"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:wp_social_autoconnect_project:wp_social_autoconnect:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-fb-autoconnect",
"packageType": "wordpress-plugin",
"product": "WP Social AutoConnect",
"vendor": "justin_k",
"versions": [
{
"lessThan": "4.6.3",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
Loading

0 comments on commit c2df183

Please sign in to comment.