Archives: Vulnerabilities
Output validation vulnerability in Single Property WordPress Theme – Moore 2.8
The Single Property theme for WordPress has a security issue that allows hackers to inject a PHP Object if they have subscriber-level access or higher. This can potentially lead to the deletion of files, access to sensitive information, or execution of code. This vulnerability affects versions up to and including 2.8 and does not require a specific type of attack.
Input validation vulnerability in Businext – Business, Finance & Crypto Currency WordPress Theme 2.4.4
The Businext theme for WordPress has a security issue that allows hackers to access and run files on the server without proper authentication. This means they can run any code they want, bypass security measures, and potentially access sensitive information. This vulnerability exists in versions up to 2.4.4 of the theme.
Input validation vulnerability in Wastia – Waste Pickup And Disposal Services WordPress Theme 1.1.3
The WordPress wastia theme has a security issue that allows any type of file to be uploaded without proper validation. This means that anyone without authentication can upload files to the website’s server, potentially allowing them to run malicious code.
Access violation vulnerability in Smart Coupons For WooCommerce Coupons 2.2.3
The Smart Coupons For WooCommerce Coupons plugin for WordPress has a security issue that allows unauthorized access. This is because it does not properly check permissions for a certain function. As a result, attackers with Subscriber-level access or higher can perform actions without permission.
Output validation vulnerability in Goldenblatt – Lawyer & Attorney WordPress Theme 1.3.0
The Goldenblatt theme for WordPress has a security issue that allows attackers to inject a PHP Object using untrusted input. This can be done by anyone without having to log in. The vulnerable software does not have any known protection against this type of attack. However, if there is a specific type of protection called a POP chain in another plugin or theme installed on the website, the attacker could potentially delete important files, access confidential information, or run their