cleantalk

Vulnerabilities and Security Researches

Vulnerabilities and security researches for wpextended

Direction: ascending

Jul 01, 2024

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-37259

CVE, Research URL

CVE-2024-37259

Date
Jul 22, 2024
Research Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Extended The Ultimate WordPress Toolkit – WP Extended allows Reflected XSS.This issue affects The Ultimate WordPress Toolkit – WP Extended: from n/a through 2.4.7.
Affected versions
Min -, max -.
Status
vulnerable

Sep 06, 2024

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-8123

CVE, Research URL

CVE-2024-8123

Date
Sep 04, 2024
Research Description
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.0.8 via the duplicate_post function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to duplicate posts written by other authors including admins. This includes the ability to duplicate password-protected posts, which reveals their contents.
Affected versions
Min -, max -.
Status
vulnerable

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-8106

CVE, Research URL

CVE-2024-8106

Date
Sep 04, 2024
Research Description
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0.8 via the download_user_ajax function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including usernames, hashed passwords, and emails.
Affected versions
Min -, max -.
Status
vulnerable

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-8102

CVE, Research URL

CVE-2024-8102

Date
Sep 04, 2024
Research Description
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the module_all_toggle_ajax() function in all versions up to, and including, 3.0.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
Affected versions
Min -, max -.
Status
vulnerable

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-8117

CVE, Research URL

CVE-2024-8117

Date
Sep 04, 2024
Research Description
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘selected_option’ parameter in all versions up to, and including, 3.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-8119

CVE, Research URL

CVE-2024-8119

Date
Sep 04, 2024
Research Description
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the page parameter in all versions up to, and including, 3.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-8121

CVE, Research URL

CVE-2024-8121

Date
Sep 04, 2024
Research Description
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to unauthorized modification of user names due to a missing capability check on the wpext_change_admin_name() function in all versions up to, and including, 3.0.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change an admin's username to a username of their liking as long as the default 'admin' was used.
Affected versions
Min -, max -.
Status
vulnerable

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-8104

CVE, Research URL

CVE-2024-8104

Date
Sep 04, 2024
Research Description
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.0.8 via the download_file_ajax function. This makes it possible for authenticated attackers, with subscriber access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.
Affected versions
Min -, max -.
Status
vulnerable

Oct 03, 2024

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-47386

CVE, Research URL

CVE-2024-47386

Date
Oct 05, 2024
Research Description
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Extended The Ultimate WordPress Toolkit – WP Extended allows Reflected XSS.This issue affects The Ultimate WordPress Toolkit – WP Extended: from n/a through 3.0.8.
Affected versions
Min -, max -.
Status
vulnerable

Oct 18, 2024

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-9347

CVE, Research URL

CVE-2024-9347

Date
Oct 17, 2024
Research Description
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpext-export' parameter in all versions up to, and including, 3.0.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable

Jan 09, 2025

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-11916

CVE, Research URL

CVE-2024-11916

Date
Jan 08, 2025
Research Description
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to unauthorized modification and retrieval of data due to a missing capability check on several functions in all versions up to, and including, 3.0.11. This makes it possible for authenticated attackers, with subscriber-level access and above, to import and activate arbitrary code snippets along with
Affected versions
Min -, max -.
Status
vulnerable

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-11816

CVE, Research URL

CVE-2024-11816

Date
Jan 08, 2025
Research Description
The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to Remote Code Execution in version 3.0.11. This is due to a missing capability check on the 'wpext_handle_snippet_update' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute code on the server providing an admin has created at least one code snippet.
Affected versions
Min -, max -.
Status
vulnerable

Jan 20, 2025

The Ultimate WordPress Toolkit – WP Extended # CVE-2024-13184

CVE, Research URL

CVE-2024-13184

Date
Jan 18, 2025
Research Description
The The Ultimate WordPress Toolkit – WP Extended plugin for WordPress is vulnerable to time-based SQL Injection via the Login Attempts module in all versions up to, and including, 3.0.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected versions
Min -, max -.
Status
vulnerable