Vulnerabilities and security researches forwp-data-access wp-data-access
Direction: ascendingJun 07, 2024
WP Data Access # CVE-2021-24866
- CVE, Research URL
- Home page URL
- Application
- Date
- Dec 06, 2021
- Research Description
- The WP Data Access WordPress plugin before 5.0.0 does not properly sanitise and escape the backup_date parameter before using it a SQL statement, leading to a SQL injection issue and could allow arbitrary table deletion
- Affected versions
-
max 5.1.4.
- Status
-
vulnerable
WP Data Access # CVE-2023-1874
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 12, 2023
- Research Description
- The WP Data Access plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.3.7. This is due to a lack of authorization checks on the multiple_roles_update function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wpda_role[]' parameter during a profile update. This requires the 'Enable role management' setting to be enabled for the site.
- Affected versions
-
max 5.3.8.
- Status
-
vulnerable
Aug 20, 2024
WP Data Access # CVE-2024-43295
- CVE, Research URL
- Home page URL
- Application
- Date
- Aug 27, 2024
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in Passionate Programmers B.V. WP Data Access.This issue affects WP Data Access: from n/a through 5.5.7.
- Affected versions
-
max 5.5.9.
- Status
-
vulnerable
Nov 15, 2024
WP Data Access # CVE-2022-4974
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 16, 2024
- Research Description
- The Freemius SDK, as used by hundreds of WordPress plugin and theme developers, was vulnerable to Cross-Site Request Forgery and Information disclosure due to missing capability checks and nonce protection on the _get_debug_log, _get_db_option, and the _set_db_option functions in versions up to, and including 2.4.2. Any WordPress plugin or theme running a version of Freemius less than 2.4.3 is vulnerable.
- Affected versions
-
max 5.1.4.
- Status
-
vulnerable
Dec 25, 2024
WP Data Access # CVE-2024-12428
- CVE, Research URL
- Home page URL
- Application
- Date
- Dec 25, 2024
- Research Description
- The WP Data Access – App, Table, Form and Chart Builder plugin plugin for WordPress is vulnerable to SQL Injection via the 'order[user_login][dir]' parameter in all versions up to, and including, 5.5.22 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
- Affected versions
-
max 5.5.23.
- Status
-
vulnerable
Apr 18, 2025
WP Data Access # CVE-2025-39582
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 16, 2025
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Passionate Programmer Peter WP Data Access allows DOM-Based XSS. This issue affects WP Data Access: from n/a through 5.5.36.
- Affected versions
-
max 5.5.37.
- Status
-
vulnerable