-
Notifications
You must be signed in to change notification settings - Fork 364
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
GHSA-r3rh-8hj6-wv7f GHSA-497f-737r-x78p GHSA-66qp-p5x9-xhxc GHSA-6qh7-3hr3-h8vg GHSA-6xmv-4qc6-c8xc GHSA-8863-4qmg-fr45 GHSA-9pcx-8wcv-8m4v GHSA-c286-9hvr-9fmm GHSA-c86g-pwgj-7qq3 GHSA-fh3v-99xx-v7cw GHSA-gj83-c9p2-m5v8 GHSA-h69h-rp3c-hvh5 GHSA-mjf9-4pcv-vfg7 GHSA-mxrr-c886-v7f7 GHSA-vcww-vw4j-8mjc GHSA-vw56-cch3-67cp GHSA-wgc3-34qh-3h44 GHSA-wgq3-vq6c-fvpp GHSA-ww8h-6gxx-9jf8 GHSA-xp8r-pgxf-vrhm
- Loading branch information
1 parent
0e12448
commit 637acbb
Showing
20 changed files
with
753 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
40 changes: 40 additions & 0 deletions
40
advisories/unreviewed/2025/01/GHSA-497f-737r-x78p/GHSA-497f-737r-x78p.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-497f-737r-x78p", | ||
"modified": "2025-01-08T09:30:38Z", | ||
"published": "2025-01-08T09:30:38Z", | ||
"aliases": [ | ||
"CVE-2024-11350" | ||
], | ||
"details": "The AdForest theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 5.1.6. This is due to the plugin not properly validating a user's identity prior to updating their password through the adforest_reset_password() function. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" | ||
} | ||
], | ||
"affected": [], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11350" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://themeforest.net/item/adforest-classified-wordpress-theme/19481695" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ebb766a-44e9-460c-be84-356b7403e593?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-640" | ||
], | ||
"severity": "CRITICAL", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2025-01-08T09:15:06Z" | ||
} | ||
} |
40 changes: 40 additions & 0 deletions
40
advisories/unreviewed/2025/01/GHSA-66qp-p5x9-xhxc/GHSA-66qp-p5x9-xhxc.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-66qp-p5x9-xhxc", | ||
"modified": "2025-01-08T09:30:38Z", | ||
"published": "2025-01-08T09:30:38Z", | ||
"aliases": [ | ||
"CVE-2024-11635" | ||
], | ||
"details": "The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" | ||
} | ||
], | ||
"affected": [], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11635" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.svn.wordpress.org/wp-file-upload/trunk/wfu_file_downloader.php" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5165f60-6515-4a2c-a124-cc88155eaf01?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-94" | ||
], | ||
"severity": "CRITICAL", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2025-01-08T08:15:24Z" | ||
} | ||
} |
40 changes: 40 additions & 0 deletions
40
advisories/unreviewed/2025/01/GHSA-6qh7-3hr3-h8vg/GHSA-6qh7-3hr3-h8vg.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-6qh7-3hr3-h8vg", | ||
"modified": "2025-01-08T09:30:38Z", | ||
"published": "2025-01-08T09:30:38Z", | ||
"aliases": [ | ||
"CVE-2024-12328" | ||
], | ||
"details": "The MAS Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" | ||
} | ||
], | ||
"affected": [], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12328" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3212434%40mas-addons-for-elementor&new=3212434%40mas-addons-for-elementor&sfp_email=&sfph_mail=" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/01ccc7b8-3dd4-4b83-bd53-687f7479b214?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-79" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2025-01-08T09:15:06Z" | ||
} | ||
} |
40 changes: 40 additions & 0 deletions
40
advisories/unreviewed/2025/01/GHSA-6xmv-4qc6-c8xc/GHSA-6xmv-4qc6-c8xc.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-6xmv-4qc6-c8xc", | ||
"modified": "2025-01-08T09:30:38Z", | ||
"published": "2025-01-08T09:30:38Z", | ||
"aliases": [ | ||
"CVE-2024-12855" | ||
], | ||
"details": "The AdForest theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several AJAX actions like 'sb_remove_ad' in all versions up to, and including, 5.1.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete posts, attachments and deactivate a license.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" | ||
} | ||
], | ||
"affected": [], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12855" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://themeforest.net/item/adforest-classified-wordpress-theme/19481695" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db7f5553-758b-47ab-8319-a549b73f4cfa?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-862" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2025-01-08T09:15:06Z" | ||
} | ||
} |
35 changes: 35 additions & 0 deletions
35
advisories/unreviewed/2025/01/GHSA-8863-4qmg-fr45/GHSA-8863-4qmg-fr45.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-8863-4qmg-fr45", | ||
"modified": "2025-01-08T09:30:39Z", | ||
"published": "2025-01-08T09:30:38Z", | ||
"aliases": [ | ||
"CVE-2024-45033" | ||
], | ||
"details": "Insufficient Session Expiration vulnerability in Apache Airflow Fab Provider.\n\nThis issue affects Apache Airflow Fab Provider: before 1.5.2.\n\nWhen user password has been changed with admin CLI, the sessions for that user have not been cleared, leading to insufficient session expiration, thus logged users could continue to be logged in even after the password was changed. This only happened when the password was changed with CLI. The problem does not happen in case change was done with webserver thus this is different from CVE-2023-40273 https://github.com/advisories/GHSA-pm87-24wq-r8w9 which was addressed in Apache-Airflow 2.7.0\n\n\nUsers are recommended to upgrade to version 1.5.2, which fixes the issue.", | ||
"severity": [], | ||
"affected": [], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45033" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/apache/airflow/pull/45139" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://lists.apache.org/thread/yw535346rk766ybzpqtvrl36sjj789st" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-613" | ||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2025-01-08T09:15:07Z" | ||
} | ||
} |
40 changes: 40 additions & 0 deletions
40
advisories/unreviewed/2025/01/GHSA-9pcx-8wcv-8m4v/GHSA-9pcx-8wcv-8m4v.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-9pcx-8wcv-8m4v", | ||
"modified": "2025-01-08T09:30:38Z", | ||
"published": "2025-01-08T09:30:38Z", | ||
"aliases": [ | ||
"CVE-2024-12584" | ||
], | ||
"details": "The 140+ Widgets | Xpro Addons For Elementor – FREE plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.6.2 via the 'duplicate' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract potentially sensitive data from draft, scheduled (future), private, and password protected posts.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" | ||
} | ||
], | ||
"affected": [], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12584" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/changeset/3212531/xpro-elementor-addons" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa085bc0-af0b-4797-a10f-4d41b4988c02?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-200" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2025-01-08T07:15:26Z" | ||
} | ||
} |
36 changes: 36 additions & 0 deletions
36
advisories/unreviewed/2025/01/GHSA-c286-9hvr-9fmm/GHSA-c286-9hvr-9fmm.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,36 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-c286-9hvr-9fmm", | ||
"modified": "2025-01-08T09:30:38Z", | ||
"published": "2025-01-08T09:30:38Z", | ||
"aliases": [ | ||
"CVE-2024-13173" | ||
], | ||
"details": "The health module has insufficient restrictions on loading URLs, which may lead to some information leakage.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V4", | ||
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" | ||
} | ||
], | ||
"affected": [], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13173" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.vivo.com/en/support/security-advisory-detail?id=14" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-306" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2025-01-08T08:15:24Z" | ||
} | ||
} |
44 changes: 44 additions & 0 deletions
44
advisories/unreviewed/2025/01/GHSA-c86g-pwgj-7qq3/GHSA-c86g-pwgj-7qq3.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-c86g-pwgj-7qq3", | ||
"modified": "2025-01-08T09:30:38Z", | ||
"published": "2025-01-08T09:30:38Z", | ||
"aliases": [ | ||
"CVE-2024-11613" | ||
], | ||
"details": "The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" | ||
} | ||
], | ||
"affected": [], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-11613" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.svn.wordpress.org/wp-file-upload/trunk/wfu_file_downloader.php" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/changeset/3217005" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/31052fe6-a0ae-4502-b2d2-dbc3b3bf672f?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-94" | ||
], | ||
"severity": "CRITICAL", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2025-01-08T07:15:26Z" | ||
} | ||
} |
36 changes: 36 additions & 0 deletions
36
advisories/unreviewed/2025/01/GHSA-fh3v-99xx-v7cw/GHSA-fh3v-99xx-v7cw.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,36 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-fh3v-99xx-v7cw", | ||
"modified": "2025-01-08T09:30:38Z", | ||
"published": "2025-01-08T09:30:38Z", | ||
"aliases": [ | ||
"CVE-2024-13186" | ||
], | ||
"details": "The MinigameCenter module has insufficient restrictions on loading URLs, which may lead to some information leakage.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V4", | ||
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" | ||
} | ||
], | ||
"affected": [], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13186" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.vivo.com/en/support/security-advisory-detail?id=16" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-306" | ||
], | ||
"severity": "MODERATE", | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": "2025-01-08T09:15:07Z" | ||
} | ||
} |
Oops, something went wrong.