Vulnerabilities and security researches forahathat ahathat
Direction: ascendingJan 04, 2025
AHAthat Plugin # CVE-2024-12595
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 02, 2025
- Research Description
- The AHAthat Plugin WordPress plugin through 1.6 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Mar 22, 2025
AHAthat Plugin # CVE-2025-2511
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 19, 2025
- Research Description
- The AHAthat Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'id' parameter in all versions up to, and including, 1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
May 07, 2025
AHAthat Plugin # CVE-2025-4337
- CVE, Research URL
- Home page URL
- Application
- Date
- May 06, 2025
- Research Description
- The AHAthat Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6. This is due to missing or incorrect nonce validation on the aha_plugin_page() function. This makes it possible for unauthenticated attackers to delete AHA pages via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable