Archives: Vulnerabilities
Access violation vulnerability in Team Manager – Team Member Showcase with grid, slider, table Elementor widget & shortcode 2.3.16
The Team Manager plugin for WordPress has a security issue that could allow unauthorized people to access it. This is because a function in versions 2.3.16 and below does not have a check to make sure only authorized users can use it. This means that attackers who are not logged in could take actions they are not supposed to.
Input validation vulnerability in WPCHURCH – Church Management System for WordPress 2.7.0
A popular plugin for the blogging platform WordPress, called WPCHURCH, has a security issue that can allow hackers to access sensitive information from the website’s database. This vulnerability is present in versions up to 2.7.0 and is caused by improper handling of user input and inadequate preparation of SQL queries. Attackers who are not logged in can add their own malicious SQL code to existing queries, putting the website at risk.
Access violation vulnerability in WPCHURCH – Church Management System for WordPress 2.7.0
The WPCHURCH plugin for WordPress, which helps manage churches, has a security issue in all versions up to 2.7.0. This means that people who are logged in and have at least Subscriber-level access can potentially gain full administrative control.
Input validation vulnerability in WPCHURCH – Church Management System for WordPress 2.7.0
The WPCHURCH plugin for WordPress has a security issue in versions up to 2.7.0 that allows attackers to inject harmful web scripts into pages. This can happen if a user is tricked into clicking on a link.
Input validation vulnerability in WPCHURCH – Church Management System for WordPress 2.7.0
The WPCHURCH plugin, which is used on WordPress websites, has a security issue in versions 2.7.0 and below. This means that hackers who are not logged in can access and run any files they want on the server. This can be used to get around security measures, get private information, or even run their own code on the website.