During the evaluation of the TJ Shortcodes plugin, a critical vulnerability was identified that permits the execution of Stored Cross-Site Scripting (XSS) attacks. This flaw enables an attacker to inject malicious scripts through a shortcode, posing a risk of account takeover.
CVE-2023-6991 – JSM file_get_contents() Shortcode – SSRF- POC
CVE-2023-6750 – Clone – Unauth Sensitive Data Exposure to Account Takeover/Backup Download – POC/Exploit

A critical vulnerability has been identified in the Clone plugin during testing, specifically within the directory /wordpress/wp-content/uploads/wp-clone/wpclone_backup. This flaw exposes comprehensive information about the site, encompassing its configuration, directories, and files. Most crucially, it grants unauthorized access to sensitive data within the database and all associated content. Exploiting this vulnerability introduces an imminent threat, potentially leading to brute force attacks on password hashes and, consequently, the compromise of the entire system.
CVE-2023-6383 – Debug Log Manager – Directory Listing to Sensitive logs exposure – POC
CVE-2023-6505 – Prime Mover – Directory Listing to Account Takeover and Sensitive Data Exposure – POC/Exploit

A critical vulnerability has been uncovered in the Prime Mover plugin, specifically within the directory http://your_site/wordpress/wp-content/uploads/prime-mover-export-files/1/. This vulnerability not only reveals comprehensive information about the site, including its configuration, directories, and files, but more critically, it grants unauthorized access to sensitive data within the database, presenting a significant security risk. The exploitation of this vulnerability could lead to potential brute force attacks on password hashes, posing an imminent threat to the compromise of the entire system.
CVE-2023-6271 – Backup Migration – Unauth Sensitive Data Exposure to Full Control of the site – POC/Exploit

A critical vulnerability has been identified in the Backup Migration plugin within the directory wordpress/wp-content/plugins/backup-backup/includes/htaccess/db_tables. This flaw not only discloses comprehensive information about the site, including its configuration, directories, and files, but, more critically, grants unauthorized access to sensitive data within the database, posing a significant security risk. Exploiting this vulnerability can lead to imminent threats, including potential brute force attacks on password hashes and the subsequent compromise of the entire system.
CVE-2023-6113 – WP Staging – Unauth Sensitive Data Exposure to Account Takeover – POC/Exploit

A critical vulnerability has been uncovered in the WP Staging plugin within the directory /wordpress/wp-content/uploads/wp-staging/cache. This vulnerability exposes comprehensive information about the site, including its configuration, directories, and files. More alarmingly, it allows unauthorized access to sensitive data within the
CVE-2023-5772 – Debug Log Manager – CSRF to clear error logs – POC
CVE-2023-6114 – Duplicator – Directory Listing to Account Takeover and Sensitive Data Exposure – POC/Exploit
CVE-2023-5906 – Job Manager & Career – Directory listing to Sensitive Data Exposure – POC

During testing, a critical vulnerability was discovered in the plugin, namely a vulnerability in the Directory Listings system, which allows an unauthorized user to view and download private files of other users. This vulnerability poses a serious security threat because it allows an attacker to gain access to confidential data and files of other users without their permission.