cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-5639,https://securityvulnerability.io/vulnerability/CVE-2024-5639,Authenticated Attackers Can Update Any User's Profile Picture via Insecure Direct Object Reference,"The User Profile Picture plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.6.1 via the 'rest_api_change_profile_image' function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to update the profile picture of any user.",Wordpress,User Profile Picture,4.3,MEDIUM,0.00044999999227002263,false,,false,false,false,,false,false,2024-06-21T06:58:18.451Z,0 CVE-2021-24675,https://securityvulnerability.io/vulnerability/CVE-2021-24675,One User Avatar < 2.3.7 - Avatar Update via CSRF,"The One User Avatar WordPress plugin before 2.3.7 does not check for CSRF when updating the Avatar in page where the [avatar_upload] shortcode is embed. As a result, attackers could make logged in user change their avatar via a CSRF attack",Wordpress,One User Avatar | User Profile Picture,6.5,MEDIUM,0.0006099999882280827,false,,false,false,false,,false,false,2021-10-18T13:45:55.000Z,0 CVE-2021-24672,https://securityvulnerability.io/vulnerability/CVE-2021-24672,One User Avatar < 2.3.7 - Contributor+ Stored Cross-Site Scripting,"The One User Avatar WordPress plugin before 2.3.7 does not escape the link and target attributes of its shortcode, allowing users with a role as low as Contributor to perform Stored Cross-Site Scripting attacks",Wordpress,One User Avatar | User Profile Picture,5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2021-10-18T13:45:53.000Z,0 CVE-2021-24473,https://securityvulnerability.io/vulnerability/CVE-2021-24473,User Profile Picture < 2.6.0 - Arbitrary User Picture Change/Deletion via IDOR,"The User Profile Picture WordPress plugin before 2.6.0 was affected by an IDOR issue, allowing users with the upload_image capability (by default author and above) to change and delete the profile pictures of other users (including those with higher roles).",Wordpress,User Profile Picture,5.4,MEDIUM,0.0007099999929778278,false,,false,false,false,,false,false,2021-08-02T10:32:14.000Z,0 CVE-2021-24170,https://securityvulnerability.io/vulnerability/CVE-2021-24170,User Profile Picture < 2.5.0 - Sensitive Information Disclosure,"The REST API endpoint get_users in the User Profile Picture WordPress plugin before 2.5.0 returned more information than was required for its functionality to users with the upload_files capability. This included password hashes, hashed user activation keys, usernames, emails, and other less sensitive information.",Wordpress,User Profile Picture,7.5,HIGH,0.005869999993592501,false,,false,false,false,,false,false,2021-04-05T18:27:44.000Z,0