cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forfull-customer full-customer

Direction: descending
May 04, 2025

FULL – Cliente # CVE-2024-12023

CVE, Research URL

CVE-2024-12023

Application

FULL – Cliente

Date
May 02, 2025
Research Description
The FULL – Cliente plugin for WordPress is vulnerable to SQL Injection via the 'formId' parameter in all versions 3.1.5 to 3.1.25 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This is only exploitable when the PRO version of the plugin is activated, along with Elementor Pro and Elementor CRM.
Affected versions
Min -, max -.
Status
vulnerable
Feb 24, 2025

FULL – Cliente # CVE-2025-26757

CVE, Research URL

CVE-2025-26757

Application

FULL – Cliente

Date
Feb 22, 2025
Research Description
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FULL SERVICES FULL Customer allows PHP Local File Inclusion. This issue affects FULL Customer: from n/a through 3.1.26.
Affected versions
Min -, max -.
Status
vulnerable
Dec 15, 2024

FULL – Cliente # CVE-2024-54313

CVE, Research URL

CVE-2024-54313

Application

FULL – Cliente

Date
Dec 13, 2024
Research Description
Path Traversal vulnerability in FULL. FULL Customer allows Path Traversal.This issue affects FULL Customer: from n/a through 3.1.25.
Affected versions
Min -, max -.
Status
vulnerable
Oct 12, 2024

FULL – Cliente # CVE-2024-9211

CVE, Research URL

CVE-2024-9211

Application

FULL – Cliente

Date
Oct 11, 2024
Research Description
The FULL – Cliente plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.1.22. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable
Jul 12, 2024

FULL – Cliente # CVE-2024-6447

CVE, Research URL

CVE-2024-6447

Application

FULL – Cliente

Date
Jul 11, 2024
Research Description
The FULL – Cliente plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the license plan parameter in all versions up to, and including, 3.1.12 due to insufficient input sanitization and output escaping as well as missing authorization and capability checks on the related functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that will execute whenever an administrative user accesses wp-admin dashboard
Affected versions
Min -, max -.
Status
vulnerable
Jun 07, 2024

FULL – Cliente # CVE-2023-4242

CVE, Research URL

CVE-2023-4242

Application

FULL – Cliente

Date
Aug 09, 2023
Research Description
The FULL - Customer plugin for WordPress is vulnerable to Information Disclosure via the /health REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to obtain sensitive information about the site configuration as disclosed by the WordPress health check.
Affected versions
Min -, max -.
Status
vulnerable

FULL – Cliente # CVE-2023-4243

CVE, Research URL

CVE-2023-4243

Application

FULL – Cliente

Date
Aug 09, 2023
Research Description
The FULL - Customer plugin for WordPress is vulnerable to Arbitrary File Upload via the /install-plugin REST route in versions up to, and including, 2.2.3 due to improper authorization. This allows authenticated attackers with subscriber-level permissions and above to execute code by installing plugins from arbitrary remote locations including non-repository sources onto the site, granted they are packaged as a valid WordPress plugin.
Affected versions
Min -, max -.
Status
vulnerable