➠ CVE-2022-4076 | codeboxr CBX User Online & Last Login Plugin on WordPress HTTP Header X-Forwarded-For neutralization for logs
A vulnerability was found in codeboxr CBX User Online & Last Login Plugin and classified as problematic. This issue affects some unknown processing of the component HTTP Header Handler. The manipulation of the argument X-Forwarded-For leads to improper output neutralization for logs. This issue appears to be a false-positive. Please verify the sources mentioned and consider not using this entry at all. The identification of this vulnerability is CVE-2022-4076. The attack may be initiated remotely. Furthermore, there is an exploit available. The real existence of this vulnerability is still doubted at the moment....
Zur Startseite
➤ Ähnliche Beiträge für 'CVE-2022-4076 | codeboxr CBX User Online & Last Login Plugin on WordPress HTTP Header X-Forwarded-For neutralization for logs'
Comments on private posts could be leaked to other users
vom 2281 Punkte
Users who lack visibility to a post are also able to access or view the comments associated with it.
This vulnerability affects the following application versions:
WordPress 3.6
WordPress 3.6.1
Stored XSS and information exposure via wp-mail.php
vom 2067.06 Punkte
User authentication is not properly checked when the WordPress mail is run to prevent stored XSS. Additionally, adding email addresses from post-by-email logs are creating potential for information exposure vulnerability.
This vulnerability affects t
Open redirect in wp_nonce_ays
vom 2060.43 Punkte
The WordPress HTTP referer is not properly validated when a user is redirected.
This vulnerability affects the following application versions:
WordPress 3.6
WordPress 3.6.1
WordPress 3.7
Leak in content from multipart emails and reverting shared objects for current user
vom 2057.35 Punkte
Reset PHPMailer properties between use to prevent information disclosure and revert shared objects for the current user to also prevent information disclosure
This vulnerability affects the following application versions:
WordPress 3.6
Stored XSS via comment editing
vom 2054.43 Punkte
Missing adequate checks during comment editing can lead to stored XSS attacks.
This vulnerability affects the following application versions:
WordPress 3.6
WordPress 3.6.1
WordPress 3.7
CSRF in wp-trackback.php
vom 2054.43 Punkte
Missing authentication settings can lead to CSRF attacks
This vulnerability affects the following application versions:
WordPress 3.6
WordPress 3.6.1
WordPress 3.7
WordPress 3.7.
SQL injection within the link API
vom 1962.27 Punkte
The link API in the bookmark is not properly checked against an SQL injection.
This vulnerability affects the following application versions:
WordPress 3.6
WordPress 3.6.1
WordPress 3.7
XSS vulnerability on the plugins screen
vom 1962.27 Punkte
The plugins screen is not properly escaped to prevent an XSS attack.
This vulnerability affects the following application versions:
WordPress 3.6
WordPress 3.6.1
WordPress 3.7
WordPress 3.7.
Output escaping issue within the_meta()
vom 1962.27 Punkte
A variable in the_meta() function is not properly escaped to prevent an XSS attack.
This vulnerability affects the following application versions:
WordPress 3.6
WordPress 3.6.1
WordPress 3.7
Object injection in some multisite installations
vom 1774.11 Punkte
The multisite installation of WordPress is not properly sanitized to prevent object injection via the upgrade process.
This vulnerability affects the following application versions:
WordPress 3.6
WordPress 3.6.1
SQL injection vulnerability in WP_Query
vom 1770.27 Punkte
Missing sanitization can lead to SQL injection in WP_Tax_Query
This vulnerability affects the following application versions:
WordPress 3.6
WordPress 3.6.1
WordPress 3.7
WordPress 3.7.
RCE POP Chains vulnerability
vom 1647.39 Punkte
Unserialized objects can lead to remote code execution, allowing an attacker to take control of all the properties of the deserialized object
This vulnerability affects the following application versions:
WordPress 4.1