cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forocean-extra ocean-extra

Direction: ascending
Jun 07, 2024

Ocean Extra # CVE-2019-16250

CVE, Research URL

CVE-2019-16250

Application

Ocean Extra

Date
Sep 12, 2019
Research Description
includes/wizard/wizard.php in the Ocean Extra plugin through 1.5.8 for WordPress allows unauthenticated options changes and injection of a Cascading Style Sheets (CSS) token sequence.
Affected versions
Min -, max -.
Status
vulnerable

Ocean Extra # CVE-2021-25104

CVE, Research URL

CVE-2021-25104

Application

Ocean Extra

Date
Jun 20, 2022
Research Description
The Ocean Extra WordPress plugin before 1.9.5 does not escape generated links which are then used when the OceanWP is active, leading to a Reflected Cross-Site Scripting issue
Affected versions
Min -, max -.
Status
vulnerable

Ocean Extra # CVE-2022-3374

CVE, Research URL

CVE-2022-3374

Application

Ocean Extra

Date
Oct 31, 2022
Research Description
The Ocean Extra WordPress plugin before 2.0.5 unserialises the content of an imported file, which could lead to PHP object injections issues when a high privilege user import (intentionally or not) a malicious Customizer Styling file and a suitable gadget chain is present on the blog.
Affected versions
Min -, max -.
Status
vulnerable

Ocean Extra # CVE-2023-23891

CVE, Research URL

CVE-2023-23891

Application

Ocean Extra

Date
Apr 06, 2023
Research Description
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in OceanWP Ocean Extra plugin <= 2.1.1 versions. Needs the OceanWP theme installed and activated.
Affected versions
Min -, max -.
Status
vulnerable

Ocean Extra # CVE-2023-0749

CVE, Research URL

CVE-2023-0749

Application

Ocean Extra

Date
Mar 13, 2023
Research Description
The Ocean Extra WordPress plugin before 2.1.3 does not ensure that the template to be loaded via a shortcode is actually a template, allowing any authenticated users such as subscriber to retrieve the content of arbitrary posts, such as draft, private or even password protected ones.
Affected versions
Min -, max -.
Status
vulnerable

Ocean Extra # CVE-2023-49164

CVE, Research URL

CVE-2023-49164

Application

Ocean Extra

Date
Dec 20, 2023
Research Description
Cross-Site Request Forgery (CSRF) vulnerability in OceanWP Ocean Extra.This issue affects Ocean Extra: from n/a through 2.2.2.
Affected versions
Min -, max -.
Status
vulnerable

Ocean Extra # CVE-2024-3167

CVE, Research URL

CVE-2024-3167

Application

Ocean Extra

Date
Apr 10, 2024
Research Description
The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘twitter_username’ parameter in versions up to, and including, 2.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable

Ocean Extra # CVE-2023-24399

CVE, Research URL

CVE-2023-24399

Application

Ocean Extra

Date
Mar 30, 2023
Research Description
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in OceanWP Ocean Extra plugin <= 2.1.2 versions.
Affected versions
Min -, max -.
Status
vulnerable

Ocean Extra # CVE-2021-4342

CVE, Research URL

-

Application

Ocean Extra

Date
Jun 07, 2023
Research Description
Rejected reason: CVE split into individual CVE IDs for each software record.
Affected versions
Min -, max -.
Status
vulnerable

Ocean Extra # CVE-2020-36760

CVE, Research URL

CVE-2020-36760

Application

Ocean Extra

Date
Jul 12, 2023
Research Description
The Ocean Extra plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.5]. This is due to missing or incorrect nonce validation on the add_core_extensions_bundle_validation() function. This makes it possible for unauthenticated attackers to validate extension bundles via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable

Ocean Extra # CVE-2024-1277

CVE, Research URL

CVE-2024-1277

Application

Ocean Extra

Date
Feb 29, 2024
Research Description
The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom fields in all versions up to, and including, 2.2.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable
Jun 13, 2024

Ocean Extra # CVE-2024-5531

CVE, Research URL

CVE-2024-5531

Application

Ocean Extra

Date
Jun 11, 2024
Research Description
The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Flickr widget in all versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable
Jul 08, 2024

Ocean Extra # CVE-2024-37489

CVE, Research URL

CVE-2024-37489

Application

Ocean Extra

Date
Jul 21, 2024
Research Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OceanWP Ocean Extra allows Stored XSS.This issue affects Ocean Extra: from n/a through 2.2.9.
Affected versions
Min -, max -.
Status
vulnerable
Nov 14, 2024

Ocean Extra # CVE-2022-4974

CVE, Research URL

CVE-2022-4974

Application

Ocean Extra

Date
Oct 16, 2024
Research Description
The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
Affected versions
Min -, max -.
Status
vulnerable
Apr 23, 2025

Ocean Extra # CVE-2025-3472

CVE, Research URL

CVE-2025-3472

Application

Ocean Extra

Date
Apr 22, 2025
Research Description
The Ocean Extra plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.4.6. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes when WooCommerce is also installed and activated.
Affected versions
Min -, max -.
Status
vulnerable
Apr 29, 2025

Ocean Extra # CVE-2025-3458

CVE, Research URL

CVE-2025-3458

Application

Ocean Extra

Date
Apr 22, 2025
Research Description
The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ocean_gallery_id’ parameter in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The Classic Editor plugin must be installed and activated to exploit the vulnerability.
Affected versions
Min -, max -.
Status
vulnerable

Ocean Extra # CVE-2025-3457

CVE, Research URL

CVE-2025-3457

Application

Ocean Extra

Date
Apr 22, 2025
Research Description
The Ocean Extra plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'oceanwp_icon' shortcode in all versions up to, and including, 2.4.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
Min -, max -.
Status
vulnerable