Donations Made Easy – Smart Donations

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in Donations Made Easy – Smart Donations 4.0.12

    Open

    The Donations Made Easy – Smart Donations plugin for WordPress is vulnerable to a security issue called Cross-Site Request Forgery. This affects versions up to and including 4.0.12. The issue is ca...

    Read More
  • Input validation vulnerability in Donations Made Easy – Smart Donations 4.0.12

    Open

    The Donations Made Easy - Smart Donations plugin for WordPress is not secure in versions up to 4.0.12. This means that if someone with access to the plugin (like a contributor) adds malicious code to...

    Read More
  • Input validation vulnerability in Donations Made Easy – Smart Donations 4.0.12

    Open

    The Donations Made Easy – Smart Donations plugin for WordPress is vulnerable to a type of attack called Stored Cross-Site Scripting. This attack could allow unauthenticated attackers to inject mali...

    Read More
  • Input validation vulnerability in Donations Made Easy – Smart Donations 4.0.12

    Open

    The Donations Made Easy plugin for WordPress has a security vulnerability which allows attackers with administrator-level access to extract sensitive information from the database. This vulnerability...

    Read More
  • Access violation vulnerability in Donations Made Easy – Smart Donations 4.0.12

    Open

    The Donations Made Easy - Smart Donations plugin for WordPress has a security issue in versions up to 4.0.12. This means that people who have an account on the website with a subscriber-level access ...

    Read More
  • Input validation vulnerability in Donations Made Easy – Smart Donations 4.0.12

    Open

    The Donations Made Easy - Smart Donations plugin for WordPress is not secure enough in versions up to and including 4.0.12. This means that unauthenticated attackers can inject web scripts into pages...

    Read More