cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches formedia-library-assistant media-library-assistant

Direction: ascending
Jun 07, 2024

Media Library Assistant # CVE-2020-11928

CVE, Research URL

CVE-2020-11928

Date
Apr 20, 2020
Research Description
In the media-library-assistant plugin before 2.82 for WordPress, Remote Code Execution can occur via the tax_query, meta_query, or date_query parameter in mla_gallery via an admin.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2022-41618

CVE, Research URL

CVE-2022-41618

Date
Nov 19, 2022
Research Description
Unauthenticated Error Log Disclosure vulnerability in Media Library Assistant plugin <= 3.00 on WordPress.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2023-0279

CVE, Research URL

CVE-2023-0279

Date
Feb 27, 2023
Research Description
The Media Library Assistant WordPress plugin before 3.06 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2024-2871

CVE, Research URL

CVE-2024-2871

Date
Apr 10, 2024
Research Description
The Media Library Assistant plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode(s) in all versions up to, and including, 3.13 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2023-4634

CVE, Research URL

CVE-2023-4634

Date
Sep 06, 2023
Research Description
The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2020-11731

CVE, Research URL

CVE-2020-11731

Date
Apr 13, 2020
Research Description
The Media Library Assistant plugin before 2.82 for Wordpress suffers from multiple XSS vulnerabilities in all Settings/Media Library Assistant tabs, which allow remote authenticated users to execute arbitrary JavaScript.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2020-11732

CVE, Research URL

CVE-2020-11732

Date
Apr 13, 2020
Research Description
The Media Library Assistant plugin before 2.82 for Wordpress suffers from a Local File Inclusion vulnerability in mla_gallery link=download.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2018-20982

CVE, Research URL

CVE-2018-20982

Date
Aug 22, 2019
Research Description
The media-library-assistant plugin before 2.74 for WordPress has XSS via the Media/Assistant or Settings/Media Library assistant admin submenu screens.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2023-34010

CVE, Research URL

CVE-2023-34010

Date
Aug 06, 2023
Research Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in submodule of David Lingren Media Library Assistant plugin  <= 3.0.7 versions.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2023-4716

CVE, Research URL

CVE-2023-4716

Date
Sep 22, 2023
Research Description
The Media Library Assistant plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'mla_gallery' shortcode in versions up to, and including, 3.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2023-24385

CVE, Research URL

CVE-2023-24385

Date
Oct 17, 2023
Research Description
Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in David Lingren Media Library Assistant plugin <= 3.11 versions.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2024-2475

CVE, Research URL

CVE-2024-2475

Date
Mar 29, 2024
Research Description
The Media Library Assistant plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.13 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2024-3519

CVE, Research URL

CVE-2024-3519

Date
May 22, 2024
Research Description
The Media Library Assistant plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the lang parameter in all versions up to, and including, 3.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable

Media Library Assistant # CVE-2024-3518

CVE, Research URL

CVE-2024-3518

Date
May 22, 2024
Research Description
The Media Library Assistant plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode(s) in all versions up to, and including, 3.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
Min -, max -.
Status
vulnerable
Jun 21, 2024

Media Library Assistant # CVE-2024-5605

CVE, Research URL

CVE-2024-5605

Date
Jun 20, 2024
Research Description
The Media Library Assistant plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter within the mla_tag_cloud Shortcode in all versions up to, and including, 3.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
Min -, max -.
Status
vulnerable
Jul 03, 2024

Media Library Assistant # CVE-2024-5544

CVE, Research URL

CVE-2024-5544

Date
Jul 02, 2024
Research Description
The Media Library Assistant plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the order parameter in all versions up to, and including, 3.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable
Aug 13, 2024

Media Library Assistant # CVE-2024-6823

CVE, Research URL

CVE-2024-6823

Date
Aug 13, 2024
Research Description
The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation involving the mla-inline-edit-upload-scripts AJAX action in all versions up to, and including, 3.18. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Affected versions
Min -, max -.
Status
vulnerable
Nov 04, 2024

Media Library Assistant # CVE-2024-51661

CVE, Research URL

CVE-2024-51661

Date
Nov 04, 2024
Research Description
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in David Lingren Media Library Assistant allows Command Injection.This issue affects Media Library Assistant: from n/a through 3.19.
Affected versions
Min -, max -.
Status
vulnerable
Jan 05, 2025

Media Library Assistant # CVE-2024-11974

CVE, Research URL

CVE-2024-11974

Date
Jan 04, 2025
Research Description
The Media Library Assistant plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘smc_settings_tab', 'unattachfixit-action', and 'woofixit-action’ parameters in all versions up to, and including, 3.23 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable
Apr 02, 2025

Media Library Assistant # CVE-2025-31627

CVE, Research URL

CVE-2025-31627

Date
Mar 31, 2025
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Lingren Media Library Assistant allows Stored XSS. This issue affects Media Library Assistant: from n/a through 3.24.
Affected versions
Min -, max -.
Status
vulnerable