cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-10789,https://securityvulnerability.io/vulnerability/CVE-2024-10789,Cross-Site Request Forgery in WP User Profile Avatar Plugin for WordPress,"The WP User Profile Avatar plugin for WordPress is susceptible to Cross-Site Request Forgery (CSRF) due to inadequate nonce validation in the wpupa_user_admin() function. This vulnerability allows unauthorized attackers to manipulate plugin settings through crafted requests, potentially deceiving site administrators into unknowingly executing actions that compromise site integrity.",Wordpress,WP User Profile Avatar,4.3,MEDIUM,0.0004600000102072954,false,,false,false,false,false,false,false,2025-01-16T03:27:22.549Z,0 CVE-2023-6067,https://securityvulnerability.io/vulnerability/CVE-2023-6067,WP User Profile Avatar <= 1.0.1 - Contributor+ Stored XSS,"The WP User Profile Avatar WordPress plugin through 1.0.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks",Wordpress,WP User Profile Avatar,,,0.0004299999854993075,false,,false,false,true,true,false,false,2024-04-15T05:00:01.200Z,0 CVE-2023-6384,https://securityvulnerability.io/vulnerability/CVE-2023-6384,WP User Profile Avatar < 1.0.1 - Author+ Avatar Deletion/Update via IDOR,"The WP User Profile Avatar WordPress plugin before 1.0.1 does not properly check for authorisation, allowing authors to delete and update arbitrary avatar",Wordpress,WP User Profile Avatar,4.3,MEDIUM,0.0005200000014156103,false,,false,false,true,true,false,false,2024-01-22T19:14:24.990Z,0 CVE-2021-24955,https://securityvulnerability.io/vulnerability/CVE-2021-24955,ProfilePress < 3.2.3 - Reflected Cross-Site Scripting,"The User Registration, Login Form, User Profile & Membership WordPress plugin before 3.2.3 does not escape the data parameter of the pp_get_forms_by_builder_type AJAX action before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue",Wordpress,"User Registration, Login Form, User Profile & Membership – Profilepress (formerly WP User Avatar)",6.1,MEDIUM,0.0007399999885819852,false,,false,false,false,,false,false,2021-12-13T10:41:29.000Z,0 CVE-2021-24954,https://securityvulnerability.io/vulnerability/CVE-2021-24954,ProfilePress < 3.2.3 - Reflected Cross-Site Scripting,"The User Registration, Login Form, User Profile & Membership WordPress plugin before 3.2.3 does not sanitise and escape the ppress_cc_data parameter before outputting it back in an attribute of an admin dashboard page, leading to a Reflected Cross-Site Scripting issue",Wordpress,"User Registration, Login Form, User Profile & Membership – Profilepress (formerly WP User Avatar)",6.1,MEDIUM,0.0007399999885819852,false,,false,false,false,,false,false,2021-12-13T10:41:28.000Z,0 CVE-2021-24522,https://securityvulnerability.io/vulnerability/CVE-2021-24522,ProfilePress < 3.1.11 - Unauthenticated Cross-Site Scripting (XSS) in tabbed login/register widget,"The User Registration, User Profile, Login & Membership – ProfilePress (Formerly WP User Avatar) WordPress plugin before 3.1.11's widget for tabbed login/register was not properly escaped and could be used in an XSS attack which could lead to wp-admin access. Further, the plugin in several places assigned $_POST as $_GET which meant that in some cases this could be replicated with just $_GET parameters and no need for $_POST values.",Wordpress,"User Registration, User Profile, Login & Membership – Profilepress (formerly WP User Avatar)",6.1,MEDIUM,0.0006699999794363976,false,,false,false,false,,false,false,2021-08-09T10:04:15.000Z,0 CVE-2021-24450,https://securityvulnerability.io/vulnerability/CVE-2021-24450,ProfilePress < 3.1.8 - Authenticated Stored XSS,"The User Registration, User Profiles, Login & Membership – ProfilePress (Formerly WP User Avatar) WordPress plugin before 3.1.8 did not sanitise or escape some of its settings before saving them and outputting them back in the page, allowing high privilege users such as admin to set JavaScript payloads in them even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue",Wordpress,"User Registration, User Profiles, Login & Membership – Profilepress (formerly WP User Avatar)",4.8,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2021-08-02T10:32:00.000Z,0