cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-12008,https://securityvulnerability.io/vulnerability/CVE-2024-12008,Information Exposure Vulnerability in W3 Total Cache Plugin by WordPress,"The W3 Total Cache plugin for WordPress exposes sensitive information through its debug log file in versions up to and including 2.8.1. When the debug feature is enabled, which is not the default setting, attackers can access potentially critical data like nonce values, which may facilitate further Cross-Site Request Forgery (CSRF) attacks. Website administrators should ensure that the debug feature remains disabled to prevent unauthorized access to sensitive information.",Wordpress,W3 Total Cache,7.5,HIGH,0.0006399999838322401,false,,false,false,false,false,false,false,2025-01-14T07:05:41.364Z,0 CVE-2024-12006,https://securityvulnerability.io/vulnerability/CVE-2024-12006,Unauthorized Data Modification in W3 Total Cache Plugin for WordPress,"The W3 Total Cache plugin for WordPress contains a vulnerability that allows unauthorized users to modify data due to a lack of proper capability checks in several critical functions. This flaw affects all versions up to and including 2.8.1, enabling unauthenticated attackers to deactivate the entire plugin and manipulate plugin extensions. As such, it poses a significant risk to the integrity and availability of WordPress sites utilizing this caching solution.",Wordpress,W3 Total Cache,5.3,MEDIUM,0.0005799999926239252,false,,false,false,false,false,false,false,2025-01-14T07:05:40.976Z,0 CVE-2024-12365,https://securityvulnerability.io/vulnerability/CVE-2024-12365,Unauthorized Data Access in W3 Total Cache Plugin for WordPress,"The W3 Total Cache plugin is susceptible to unauthorized access to sensitive data due to an absence of capability checks on the is_w3tc_admin_page function. This flaw affects all versions up to and including 2.8.1, enabling authenticated attackers with Subscriber-level access and above to exploit the vulnerability. Attackers can retrieve the plugin's nonce value, perform unauthorized operations, disclose information, exhaust service plan limits, and facilitate web requests to any location. This presents risks for querying data from internal services, including crucial instance metadata in cloud-based environments.",Wordpress,W3 Total Cache,8.5,HIGH,0.0009299999801442027,false,,true,false,true,false,false,false,2025-01-14T07:05:40.307Z,280 CVE-2023-5359,https://securityvulnerability.io/vulnerability/CVE-2023-5359,W3 Total Cache Plugin vulnerable to Sensitive Information Exposure,"The W3 Total Cache plugin for WordPress has a vulnerability that exposes sensitive information, specifically Google OAuth API secrets, stored in plaintext within the publicly accessible plugin source code. This flaw allows unauthenticated attackers the potential to impersonate the plugin, which may lead to unauthorized access to user account information under certain conditions. While this vulnerability does not impact users' WordPress sites directly, it raises significant security concerns regarding data privacy.",Wordpress,W3 Total Cache,7.5,HIGH,0.0006399999838322401,false,,false,false,false,,false,false,2024-09-25T01:15:00.000Z,0 CVE-2021-24452,https://securityvulnerability.io/vulnerability/CVE-2021-24452,W3 Total Cache < 2.1.5 - Reflected XSS in Extensions Page (JS Context),"The W3 Total Cache WordPress plugin before 2.1.5 was affected by a reflected Cross-Site Scripting (XSS) issue within the ""extension"" parameter in the Extensions dashboard, when the 'Anonymously track usage to improve product quality' setting is enabled, as the parameter is output in a JavaScript context without proper escaping. This could allow an attacker, who can convince an authenticated admin into clicking a link, to run malicious JavaScript within the user's web browser, which could lead to full site compromise.",Wordpress,W3 Total Cache,6.1,MEDIUM,0.0010999999940395355,false,,false,false,false,,false,false,2021-07-19T10:53:17.000Z,0 CVE-2021-24436,https://securityvulnerability.io/vulnerability/CVE-2021-24436,W3 Total Cache < 2.1.4 - Reflected XSS in Extensions Page (Attribute Context),"The W3 Total Cache WordPress plugin before 2.1.4 was vulnerable to a reflected Cross-Site Scripting (XSS) security vulnerability within the ""extension"" parameter in the Extensions dashboard, which is output in an attribute without being escaped first. This could allow an attacker, who can convince an authenticated admin into clicking a link, to run malicious JavaScript within the user's web browser, which could lead to full site compromise.",Wordpress,W3 Total Cache,6.1,MEDIUM,0.0010999999940395355,false,,false,false,false,,false,false,2021-07-19T10:53:15.000Z,0 CVE-2021-24427,https://securityvulnerability.io/vulnerability/CVE-2021-24427,W3 Total Cache < 2.1.3 - Authenticated Stored XSS,"The W3 Total Cache WordPress plugin before 2.1.3 did not sanitise or escape some of its CDN settings, allowing high privilege users to use JavaScript in them, which will be output in the page, leading to an authenticated Stored Cross-Site Scripting issue",Wordpress,W3 Total Cache,4.8,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2021-07-12T19:20:58.000Z,0 CVE-2013-2010,https://securityvulnerability.io/vulnerability/CVE-2013-2010,,WordPress W3 Total Cache Plugin 0.9.2.8 has a Remote PHP Code Execution Vulnerability,Wordpress,W3 Total Cache Plugin,9.8,CRITICAL,0.9707099795341492,false,,false,false,false,,false,false,2020-02-12T14:45:51.000Z,0 CVE-2019-6715,https://securityvulnerability.io/vulnerability/CVE-2019-6715,,pub/sns.php in the W3 Total Cache plugin before 0.9.4 for WordPress allows remote attackers to read arbitrary files via the SubscribeURL field in SubscriptionConfirmation JSON data.,Wordpress,W3 Total Cache,7.5,HIGH,0.3590799868106842,false,,false,false,true,true,false,false,2019-04-01T19:05:55.000Z,0 CVE-2014-9414,https://securityvulnerability.io/vulnerability/CVE-2014-9414,,"The W3 Total Cache plugin before 0.9.4.1 for WordPress does not properly handle empty nonces, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and hijack the authentication of administrators for requests that change the mobile site redirect URI via the mobile_groups[*][redirect] parameter and an empty _wpnonce parameter in the w3tc_mobile page to wp-admin/admin.php.",Wordpress,W3 Total Cache,,,0.043699998408555984,false,,false,false,false,,false,false,2014-12-24T18:00:00.000Z,0 CVE-2014-8724,https://securityvulnerability.io/vulnerability/CVE-2014-8724,,"Cross-site scripting (XSS) vulnerability in the W3 Total Cache plugin before 0.9.4.1 for WordPress, when debug mode is enabled, allows remote attackers to inject arbitrary web script or HTML via the ""Cache key"" in the HTML-Comments, as demonstrated by the PATH_INFO to the default URI.",Wordpress,W3 Total Cache,,,0.003800000064074993,false,,false,false,false,,false,false,2014-12-19T15:00:00.000Z,0