This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
A plugin called OAuth Single Sign On - SSO (OAuth Client) for WordPress has a security issue in versions up to 6.26.12. This is because the plugin does not properly check for safe and valid JWT toke...
Read MoreA popular plugin for WordPress called OAuth Single Sign On - SSO has a security issue that allows hackers to trick site administrators into giving them access. This is because the plugin uses a predi...
Read MoreThe plugin called OAuth Single Sign On - SSO for WordPress has a security issue that affects all versions up to 6.26.3. This means that anyone who is not logged in can bypass the authentication proce...
Read MoreThe OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to unauthorized changes of data. This means that people with access to the plugin could change its settings, potenti...
Read MoreThe OAuth Single Sign On plugin for WordPress is not secure in versions up to 6.24.1. This means that someone without permission could make changes to the plugin's settings if they are able to trick a...
Read MoreThe OAuth Single Sign On WordPress plugin before version 6.22.6 has a security vulnerability that allows malicious attackers to log into a website using just a user's email address. The vulnerability ...
Read MoreThe OAuth Single Sign On plugin for WordPress (also known as the OAuth Client) is not secure in versions up to 6.24.1. This means that someone who is not logged in can make changes to the settings of ...
Read MoreThe OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is not secure in versions up to and including 6.22.5. Attackers can inject malicious web scripts into this plugin, which will then...
Read MoreMultiple miniorange Plugins for WordPress have a security vulnerability which can allow unauthenticated attackers to inject malicious code into webpages. This happens when the 'appId' parameter is not...
Read More