cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-11939,https://securityvulnerability.io/vulnerability/CVE-2024-11939,Blind Time-Based SQL Injection Vulnerability in Cost Calculator Builder PRO Plugin for WordPress,"The Cost Calculator Builder PRO plugin for WordPress suffers from a blind time-based SQL injection vulnerability due to improper handling of the 'data' parameter. This weakness affects all versions up to and including 3.2.15. Unsanitized input allows unauthenticated attackers to inject malicious SQL queries, potentially exposing sensitive data from the WordPress database. This issue arises from insufficient escaping of user-supplied input and inadequate preparation of SQL queries, posing a serious security risk for WordPress sites utilizing this plugin.",Wordpress,Cost Calculator Builder Pro,7.5,HIGH,0.0008699999889358878,false,,false,false,false,false,false,false,2025-01-08T08:18:17.475Z,0 CVE-2024-8379,https://securityvulnerability.io/vulnerability/CVE-2024-8379,SQL Injection Vulnerability in Cost Calculator Builder WordPress Plugin,"The Cost Calculator Builder plugin for WordPress has a vulnerability that arises from improper sanitization and escaping of a parameter prior to its use in an SQL statement. This flaw allows authenticated users with a role as low as Admin to exploit the underlying SQL injection, potentially leading to unauthorized access or manipulation of the database. Developers and site administrators should take immediate action to update the plugin to version 3.2.29 or later to mitigate this risk.",Wordpress,Cost Calculator Builder,7.2,HIGH,0.0005000000237487257,false,,false,false,true,true,false,false,2024-09-30T06:00:07.069Z,0 CVE-2024-6010,https://securityvulnerability.io/vulnerability/CVE-2024-6010,Unauthenticated Price Manipulation Vulnerability in Cost Calculator Builder PRO Plugin,"The Cost Calculator Builder PRO plugin for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.1.96. This is due to the plugin allowing the price field to be manipulated prior to processing via the 'create_cc_order' function, called from the Cost Calculator Builder plugin. This makes it possible for unauthenticated attackers to manipulate the price of orders submitted via the calculator. Note: this vulnerability was partially patched with the release of Cost Calculator Builder version 3.2.17.",Wordpress,Cost Calculator Builder Pro,5.3,MEDIUM,0.0005200000014156103,false,,false,false,false,,false,false,2024-09-07T11:17:06.172Z,0 CVE-2024-6012,https://securityvulnerability.io/vulnerability/CVE-2024-6012,Unauthorized Data Modification Vulnerability in Cost Calculator Builder Plugin for WordPress,"The Cost Calculator Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'embed-create-page' and 'embed-insert-pages' functions in all versions up to, and including, 3.2.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary posts and append arbitrary content to existing posts.",Wordpress,Cost Calculator Builder,4.3,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,2024-07-02T10:15:00.000Z,0 CVE-2024-6011,https://securityvulnerability.io/vulnerability/CVE-2024-6011,Stored Cross-Site Scripting Vulnerability in Cost Calculator Builder Plugin for WordPress,"The Cost Calculator Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘textarea.description’ parameter in all versions up to, and including, 3.2.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",Wordpress,Cost Calculator Builder,4.8,MEDIUM,0.0007099999929778278,false,,false,false,false,,false,false,2024-07-02T10:15:00.000Z,0 CVE-2024-4787,https://securityvulnerability.io/vulnerability/CVE-2024-4787,Unauthenticated Email Sending Vulnerability in Cost Calculator Builder PRO for WordPress,"The Cost Calculator Builder PRO for WordPress is vulnerable to arbitrary email sending vulnerability in versions up to, and including, 3.1.75. This is due to insufficient limitations on the email recipient and the content in the 'send_pdf' and the 'send_pdf_front' functions which are reachable via AJAX. This makes it possible for unauthenticated attackers to send emails with any content to any recipient.",Wordpress,Cost Calculator Builder Pro,5.8,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2024-06-19T03:12:28.211Z,0 CVE-2024-4789,https://securityvulnerability.io/vulnerability/CVE-2024-4789,Cost Calculator Builder Pro <= 3.1.72 - Authenticated (Subscriber+) Server-Side Request Forgery,"Cost Calculator Builder Pro plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to 3.1.72, via the send_demo_webhook() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.",Wordpress,Cost Calculator Builder Pro,6.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-17T08:31:40.643Z,0 CVE-2024-4097,https://securityvulnerability.io/vulnerability/CVE-2024-4097,Stored Cross-Site Scripting Vulnerability in WordPress Cost Calculator Builder Plugin,"The Cost Calculator Builder plugin for WordPress is exposed to a vulnerability that permits Stored Cross-Site Scripting (XSS) due to inadequate input sanitization and output escaping in its SVG upload functionality. This flaw affects all versions of the plugin up to and including 3.1.67. Unauthenticated attackers can exploit this vulnerability by injecting arbitrary web scripts into the plugin, which would execute whenever a user interacts with the compromised page. The risk of such an attack emphasizes the necessity for users to ensure their plugins are updated to protect against potential exploitation.",Wordpress,Cost Calculator Builder,7.2,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,2024-05-02T16:57:16.379Z,0 CVE-2024-0821,https://securityvulnerability.io/vulnerability/CVE-2024-0821,WooCommerce Cost & Profit Calculator Vulnerable to Reflected Cross-Site Scripting,"The Cost of Goods Sold (COGS): Cost & Profit Calculator for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'section' parameter in all versions up to, and including, 3.2.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.",Wordpress,Cost of Goods Sold (COGS): Cost & Profit Calculator for WooCommerce,6.1,MEDIUM,0.0004299999854993075,false,,false,false,false,,false,false,2024-02-29T01:43:00.000Z,0 CVE-2023-0983,https://securityvulnerability.io/vulnerability/CVE-2023-0983,Stylish Cost Calculator Premium < 7.9.0 - Unauthenticated Stored XSS,"The stylish-cost-calculator-premium WordPress plugin before 7.9.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Stored Cross-Site Scripting which could be used against admins when viewing submissions submitted through the Email Quote Form.",Wordpress,Stylish Cost Calculator Premium,6.1,MEDIUM,0.0007200000109151006,false,,false,false,false,,false,false,2023-04-10T14:15:00.000Z,0 CVE-2023-0165,https://securityvulnerability.io/vulnerability/CVE-2023-0165,Cost Calculator <= 1.8 - Contributor+ Stored XSS,"The Cost Calculator WordPress plugin through 1.8 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.",Wordpress,Cost Calculator,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2023-03-06T14:15:00.000Z,0 CVE-2023-1155,https://securityvulnerability.io/vulnerability/CVE-2023-1155,Stored Cross-Site Scripting Vulnerability in Cost Calculator Plugin for WordPress,"The Cost Calculator plugin for WordPress is susceptible to Stored Cross-Site Scripting due to inadequate sanitization of the nd_cc_meta_box_cc_price_icon parameter. This vulnerability affects versions up to and including 1.8. Authenticated attackers with contributor-level or higher permissions can exploit this flaw to inject malicious scripts into pages. These scripts will execute when the affected page is accessed by users, potentially compromising user data and website integrity.",Wordpress,Cost Calculator,5.4,MEDIUM,0.0005000000237487257,false,,false,false,false,,false,false,2023-03-02T18:15:00.000Z,0 CVE-2021-24821,https://securityvulnerability.io/vulnerability/CVE-2021-24821,Cost Calculator < 1.6 - Contributor+ Stored Cross-Site Scripting,"The Cost Calculator WordPress plugin before 1.6 allows users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks via the Description fields of a Cost Calculator > Price Settings (which gets injected on the edit page as well as any page that embeds the calculator using the shortcode), as well as the Text Preview field of a Project (injected on the edit project page)",Wordpress,Cost Calculator,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2022-03-07T08:16:02.000Z,0 CVE-2021-24820,https://securityvulnerability.io/vulnerability/CVE-2021-24820,Cost Calculator <= 1.6 - Authenticated Local File Inclusion,"The Cost Calculator WordPress plugin through 1.6 allows authenticated users (Contributor+ in versions < 1.5, and Admin+ in versions <= 1.6) to perform path traversal and local PHP file inclusion on Windows Web Servers via the Cost Calculator post's Layout",Wordpress,Cost Calculator,6.5,MEDIUM,0.0007099999929778278,false,,false,false,false,,false,false,2022-02-28T09:06:10.000Z,0 CVE-2021-24822,https://securityvulnerability.io/vulnerability/CVE-2021-24822,Stylish Cost Calculator < 7.04 - Subscriber+ Unauthorised AJAX Calls to Stored XSS,"The Stylish Cost Calculator WordPress plugin before 7.0.4 does not have any authorisation and CSRF checks on some of its AJAX actions (available to authenticated users), which could allow any authenticated users, such as subscriber to call them, and perform Stored Cross-Site Scripting attacks against logged in admin, as well as frontend users due to the lack of sanitisation and escaping in some parameters",Wordpress,Stylish Cost Calculator,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2021-11-29T08:25:39.000Z,0