Vulnerabilities and security researches forfull-customer full-customer
Direction: descendingMay 04, 2025
FULL – Cliente # CVE-2024-12023
- CVE, Research URL
- Home page URL
- Application
- Date
- May 02, 2025
- Research Description
- The FULL – Cliente plugin for WordPress is vulnerable to SQL Injection via the 'formId' parameter in all versions 3.1.5 to 3.1.25 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This is only exploitable when the PRO version of the plugin is activated, along with Elementor Pro and Elementor CRM.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Feb 24, 2025
FULL – Cliente # CVE-2025-26757
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 22, 2025
- Research Description
- Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FULL SERVICES FULL Customer allows PHP Local File Inclusion. This issue affects FULL Customer: from n/a through 3.1.26.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Dec 15, 2024
FULL – Cliente # CVE-2024-54313
- CVE, Research URL
- Home page URL
- Application
- Date
- Dec 13, 2024
- Research Description
- Path Traversal vulnerability in FULL. FULL Customer allows Path Traversal.This issue affects FULL Customer: from n/a through 3.1.25.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Oct 12, 2024
FULL – Cliente # CVE-2024-9211
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 11, 2024
- Research Description
- The FULL – Cliente plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.1.22. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jul 12, 2024
FULL – Cliente # CVE-2024-6447
- CVE, Research URL
- Home page URL
- Application
- Date
- Jul 11, 2024
- Research Description
- The FULL – Cliente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the license plan parameter in all versions up to, and including, 3.1.12 due to insufficient input sanitization and output escaping as well as missing authorization and capability checks on the related functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute whenever an administrative user accesses wp-admin dashboard
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jun 07, 2024
FULL – Cliente # CVE-2023-4242
- CVE, Research URL
- Home page URL
- Application
- Date
- Aug 09, 2023
- Research Description
- The FULL - Customer plugin for WordPress is vulnerable to Information Disclosure via the /health REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to obtain sensitive information about the site configuration as disclosed by the WordPress health check.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
FULL – Cliente # CVE-2023-4243
- CVE, Research URL
- Home page URL
- Application
- Date
- Aug 09, 2023
- Research Description
- The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable