Vulnerabilities and security researches forwp-recall wp-recall
Direction: descendingMay 08, 2025
WP-Recall – Registration, Profile, Commerce & More # CVE-2024-9771
- CVE, Research URL
- Date
- Apr 28, 2025
- Research Description
- The WP-Recall WordPress plugin before 16.26.12 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Mar 09, 2025
WP-Recall – Registration, Profile, Commerce & More # CVE-2025-1323
- CVE, Research URL
- Date
- Mar 08, 2025
- Research Description
- The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to SQL Injection via the 'databeat' parameter in all versions up to, and including, 16.26.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
WP-Recall – Registration, Profile, Commerce & More # CVE-2025-1324
- CVE, Research URL
- Date
- Mar 08, 2025
- Research Description
- The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'public-form' shortcode in all versions up to, and including, 16.26.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
WP-Recall – Registration, Profile, Commerce & More # CVE-2025-1325
- CVE, Research URL
- Date
- Mar 08, 2025
- Research Description
- The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to arbitrary shortcode execution due to a missing capability check on the 'rcl_preview_post' AJAX endpoint in all versions up to, and including, 16.26.10. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
WP-Recall – Registration, Profile, Commerce & More # CVE-2025-1322
- CVE, Research URL
- Date
- Mar 08, 2025
- Research Description
- The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 16.26.10 via the 'feed' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to view data from password protected, private, or draft posts that they should not have access to.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Sep 07, 2024
WP-Recall – Registration, Profile, Commerce & More # CVE-2024-8292
- CVE, Research URL
- Date
- Sep 06, 2024
- Research Description
- The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to privilege escalation/account takeover in all versions up to, and including, 16.26.8. This is due to to plugin not properly verifying a user's identity during new order creation. This makes it possible for unauthenticated attackers to supply any email through the user_email field and update the password for that user during new order creation. This requires the commerce addon to be enabled in order to exploit.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jul 23, 2024
WP-Recall – Registration, Profile, Commerce & More # CVE-2024-1175
- CVE, Research URL
- Date
- Jun 06, 2024
- Research Description
- The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'delete_payment' function in all versions up to, and including, 16.26.6. This makes it possible for unauthenticated attackers to delete arbitrary payments.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jun 08, 2024
WP-Recall – Registration, Profile, Commerce & More # CVE-2024-35657
- CVE, Research URL
- Date
- Jun 08, 2024
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.6.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jun 07, 2024
WP-Recall – Registration, Profile, Commerce & More # CVE-2024-32710
- CVE, Research URL
- Date
- Apr 24, 2024
- Research Description
- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
WP-Recall – Registration, Profile, Commerce & More # CVE-2024-32709
- CVE, Research URL
- Date
- Apr 24, 2024
- Research Description
- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
WP-Recall – Registration, Profile, Commerce & More # CVE-2024-32604
- CVE, Research URL
- Date
- Apr 18, 2024
- Research Description
- Authorization Bypass Through User-Controlled Key vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
WP-Recall – Registration, Profile, Commerce & More # 622793af3b328d977b3f5341e896f387c0fdbb66
- CVE, Research URL
- Date
- Oct 05, 2021
- Research Description
- WP-Recall – Registration, Profile, Commerce & More [wp-recall] < 16.24.48 (closed) WP-Recall <= 16.24.47 - Reflected Cross-Site Scripting The WP-Recall plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'date-start' and 'end-start' parameters in versions up to, and including, 16.24.47 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable