cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forpoll-wp poll-wp

Direction: ascending
Jun 07, 2024

TS Poll – Best Poll Plugin for WordPress # CVE-2020-11673

CVE, Research URL

CVE-2020-11673

Date
Apr 13, 2020
Research Description
An issue was discovered in the Responsive Poll through 1.3.4 for Wordpress. It allows an unauthenticated user to manipulate polls, e.g., delete, clone, or view a hidden poll. This is due to the usage of the callback wp_ajax_nopriv function in Includes/Total-Soft-Poll-Ajax.php for sensitive operations.
Affected versions
Min -, max -.
Status
vulnerable
Oct 11, 2024

TS Poll – Best Poll Plugin for WordPress # CVE-2024-9022

CVE, Research URL

CVE-2024-9022

Date
Oct 10, 2024
Research Description
The TS Poll – Survey, Versus Poll, Image Poll, Video Poll plugin for WordPress is vulnerable to SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 2.3.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
Min -, max -.
Status
vulnerable
Oct 22, 2024

TS Poll – Best Poll Plugin for WordPress # CVE-2024-8625

CVE, Research URL

CVE-2024-8625

Date
Oct 21, 2024
Research Description
TS Poll &#8211; Survey, Versus Poll, Image Poll, Video Poll [poll-wp] < 2.4.0 CVE-2024-8625 [en] The TS Poll WordPress plugin before 2.4.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks
Affected versions
Min -, max -.
Status
vulnerable
Apr 16, 2025

TS Poll &#8211; Best Poll Plugin for WordPress # CVE-2025-3470

CVE, Research URL

CVE-2025-3470

Date
Apr 15, 2025
Research Description
The TS Poll – Survey, Versus Poll, Image Poll, Video Poll plugin for WordPress is vulnerable to SQL Injection via the s parameter in all versions up to, and including, 2.4.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
Min -, max -.
Status
vulnerable