Betheme

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in Betheme 28.1.3

    Fixed

    The Betheme theme for WordPress has a security issue where it is possible for attackers with Contributor-level access or higher to insert harmful code into website pages. This can happen because the ...

    Read More
  • Input validation vulnerability in Betheme 28.0.3

    Fixed

    The Betheme theme for WordPress has a security issue that allows attackers to inject harmful web scripts into pages. This can happen when a user who has contributor-level access or higher uses the pl...

    Read More
  • Input validation vulnerability in Betheme 27.6.1

    Fixed

    The Betheme plugin for WordPress has a security issue that allows hackers to inject malicious code into web pages. This can happen in all versions up to 27.6.1 because the plugin does not properly cl...

    Read More
  • Input validation vulnerability in Betheme 27.5.5

    Fixed

    The Betheme theme for WordPress has a security issue that could allow hackers to insert harmful code into a website. This can happen when uploading SVG files, and it affects all versions up to 27.5.5...

    Read More
  • Input validation vulnerability in Betheme 27.5.6

    Fixed

    The Betheme theme for WordPress has a security vulnerability that allows attackers to inject malicious code. This can only be done by someone who has contributor-level access or higher. If the target...

    Read More
  • Input validation vulnerability in Betheme 27.5.6

    Open

    The Betheme theme for WordPress is at risk of a security breach called Stored Cross-Site Scripting. This can happen when certain codes are used in the plugin, which has been found in all versions up ...

    Read More
  • Access violation vulnerability in Betheme 27.1.1

    Fixed

    The Betheme WordPress theme has a security vulnerability that allows people with contributor level access or higher to access certain functions without proper authorization. This vulnerability affect...

    Read More
  • Access violation vulnerability in Betheme 27.1.1

    Fixed

    The Betheme theme for WordPress has a security issue that can potentially cause unauthorized loss of data. This vulnerability exists in versions up to 27.1.1. It allows people with author-level acces...

    Read More
  • Output validation vulnerability in Betheme 26.5.1.4

    Fixed

    The Betheme theme for WordPress has a security issue that affects versions up to 26.5.1.4. If exploited

    Read More
  • Access violation vulnerability in Betheme 26.6.2

    Fixed

    The Betheme theme for WordPress has a security vulnerability that affects versions up to 26.6.2. This means that people with minimal permissions

    Read More
  • Output validation vulnerability in Betheme 26.5.1.4

    Fixed

    The Betheme theme for WordPress

    Read More
  • Input validation vulnerability in Betheme 26.7.5

    Fixed

    The Betheme theme for WordPress is not secure in versions up to 26.7.5. This means that malicious people could inject web scripts on shop pages that would run if someone clicked on a link they sent. T...

    Read More
  • Access violation vulnerability in Betheme 26.6.1

    Fixed

    The Betheme WordPress theme is not secure in versions up to 26.6.2. This means that someone who is signed in with only minimal permission

    Read More
  • Access violation vulnerability in Betheme 26.6.2

    Fixed

    Betheme is a WordPress theme that had a security vulnerability in versions up to 26.6.2. This vulnerability allowed people with minimal access

    Read More
  • Access violation vulnerability in Betheme 26.6.2

    Fixed

    Betheme

    Read More
  • Input validation vulnerability in Betheme 26.6.2

    Fixed

    Betheme

    Read More
  • Access violation vulnerability in Betheme 26.6.2

    Fixed

    The Betheme theme for WordPress has a security issue in versions up to 26.6.2. This means that someone with minimal permissions

    Read More