cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-0600,https://securityvulnerability.io/vulnerability/CVE-2023-0600,WP Visitor Statistics (Real Time Traffic) < 6.9 - Unauthenticated SQLi,"The WP Visitor Statistics (Real Time Traffic) plugin for WordPress, prior to version 6.9, is vulnerable to SQL Injection due to inadequate input sanitization. This flaw enables unauthenticated users to manipulate SQL queries, potentially gaining unauthorized access to sensitive data or compromising the integrity of the database. Proper input validation is essential to mitigate the risks associated with such vulnerabilities.",Wordpress,WP Visitor Statistics (real Time Traffic),9.8,CRITICAL,0.11913999915122986,false,,false,false,true,true,false,false,2023-05-15T13:15:00.000Z,0 CVE-2022-4656,https://securityvulnerability.io/vulnerability/CVE-2022-4656,WP Visitor Statistics (Real Time Traffic) < 6.5 - Contributor+ Stored XSS via Shortcode,"The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 6.5 does not validate and escape one of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack.",Wordpress,WP Visitor Statistics (real Time Traffic),5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2023-02-13T14:32:19.074Z,0 CVE-2022-0410,https://securityvulnerability.io/vulnerability/CVE-2022-0410,WP Visitor Statistics (Real Time Traffic) < 5.6 - Subscriber+ SQL Injection,"The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 5.6 does not sanitise and escape the id parameter before using it in a SQL statement via the refUrlDetails AJAX action, available to any authenticated user, leading to a SQL injection",Wordpress,WP Visitor Statistics (real Time Traffic),8.8,HIGH,0.001120000029914081,false,,false,false,false,,false,false,2022-03-07T08:16:31.000Z,0 CVE-2021-25042,https://securityvulnerability.io/vulnerability/CVE-2021-25042,WP Visitor Statistics (Real Time Traffic) < 5.5 - Arbitrary IP Address Exclusion to Stored XSS,"The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 5.5 does not have authorisation and CSRF checks in the updateIpAddress AJAX action, allowing any authenticated user to call it, or make a logged in user do it via a CSRF attack and add an arbitrary IP address to exclude. Furthermore, due to the lack of validation, sanitisation and escaping, users could set a malicious value and perform Cross-Site Scripting attacks against logged in admin",Wordpress,WP Visitor Statistics (real Time Traffic),5.4,MEDIUM,0.000539999979082495,false,,false,false,false,,false,false,2022-02-28T09:06:33.000Z,0 CVE-2021-24750,https://securityvulnerability.io/vulnerability/CVE-2021-24750,WP Visitor Statistics (Real Time Traffic) < 4.8 - Subscriber+ SQL Injection,"The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 4.8 does not properly sanitise and escape the refUrl in the refDetails AJAX action, available to any authenticated user, which could allow users with a role as low as subscriber to perform SQL injection attacks",Wordpress,WP Visitor Statistics (real Time Traffic),8.8,HIGH,0.6737300157546997,false,,false,false,true,true,false,false,2021-12-21T08:45:29.000Z,0