Vulnerabilites related to templateinvaders - TI WooCommerce Wishlist
cve-2020-36725
Vulnerability from cvelistv5
Published
2023-06-07 01:51
Modified
2024-12-23 16:20
Severity ?
EPSS score ?
Summary
The TI WooCommerce Wishlist and TI WooCommerce Wishlist Pro plugins for WordPress are vulnerable to an Options Change vulnerability in versions up to, and including, 1.21.11 and 1.21.4 via the 'ti-woocommerce-wishlist/includes/export.class.php' file. This makes it possible for authenticated attackers to gain otherwise restricted access to the vulnerable blog and update any settings.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | templateinvaders | TI WooCommerce Wishlist |
Version: * ≤ 1.21.11 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:37:06.721Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d60b5741-5496-4e87-bcb0-adaa0db07d90?source=cve" }, { "tags": [ "x_transferred" ], "url": "https://blog.nintechnet.com/critical-zero-day-vulnerability-fixed-in-wordpress-ti-woocommerce-wishlist-plugin/" }, { "tags": [ "x_transferred" ], "url": "https://templateinvaders.com/changelogs/ti-woocommerce-wishlist-plugin-changelog/" }, { "tags": [ "x_transferred" ], "url": "https://wpscan.com/vulnerability/2e2fb815-7cca-4e6c-b466-179337fe99ee" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-36725", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-23T16:00:46.855169Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-23T16:20:52.900Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "TI WooCommerce Wishlist", "vendor": "templateinvaders", "versions": [ { "lessThanOrEqual": "1.21.11", "status": "affected", "version": "*", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TI WooCommerce Wishlist Pro", "vendor": "TemplateInvaders", "versions": [ { "lessThanOrEqual": "1.21.4", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Jerome Bruandet" } ], "descriptions": [ { "lang": "en", "value": "The TI WooCommerce Wishlist and TI WooCommerce Wishlist Pro plugins for WordPress are vulnerable to an Options Change vulnerability in versions up to, and including, 1.21.11 and 1.21.4 via the \u0027ti-woocommerce-wishlist/includes/export.class.php\u0027 file. This makes it possible for authenticated attackers to gain otherwise restricted access to the vulnerable blog and update any settings." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-862 Missing Authorization", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-07T01:51:45.136Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d60b5741-5496-4e87-bcb0-adaa0db07d90?source=cve" }, { "url": "https://blog.nintechnet.com/critical-zero-day-vulnerability-fixed-in-wordpress-ti-woocommerce-wishlist-plugin/" }, { "url": "https://templateinvaders.com/changelogs/ti-woocommerce-wishlist-plugin-changelog/" }, { "url": "https://wpscan.com/vulnerability/2e2fb815-7cca-4e6c-b466-179337fe99ee" } ], "timeline": [ { "lang": "en", "time": "2020-10-16T00:00:00.000+00:00", "value": "Disclosed" } ] } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2020-36725", "datePublished": "2023-06-07T01:51:45.136Z", "dateReserved": "2023-06-06T13:19:52.903Z", "dateUpdated": "2024-12-23T16:20:52.900Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-10567
Vulnerability from cvelistv5
Published
2024-12-04 08:22
Modified
2024-12-04 15:01
Severity ?
EPSS score ?
Summary
The TI WooCommerce Wishlist plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wizard' function in all versions up to, and including, 2.9.1. This makes it possible for unauthenticated attackers to create new pages, modify plugin settings, and perform limited options updates.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
templateinvaders | TI WooCommerce Wishlist |
Version: * ≤ 2.9.1 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:woocommerce:woocommerce:*:*:*:*:*:wordpress:*:*" ], "defaultStatus": "unaffected", "product": "woocommerce", "vendor": "woocommerce", "versions": [ { "lessThanOrEqual": "2.9.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-10567", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T14:59:59.546437Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T15:01:08.812Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "TI WooCommerce Wishlist", "vendor": "templateinvaders", "versions": [ { "lessThanOrEqual": "2.9.1", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "abrahack" } ], "descriptions": [ { "lang": "en", "value": "The TI WooCommerce Wishlist plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the \u0027wizard\u0027 function in all versions up to, and including, 2.9.1. This makes it possible for unauthenticated attackers to create new pages, modify plugin settings, and perform limited options updates." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T08:22:45.515Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5f2e1a-2216-4885-9b74-a08142816f2b?source=cve" }, { "url": "https://plugins.trac.wordpress.org/changeset/3199516/ti-woocommerce-wishlist" } ], "timeline": [ { "lang": "en", "time": "2024-11-01T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2024-12-03T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "TI WooCommerce Wishlist \u003c= 2.9.1 - Missing Authorization to Unauthenticated Plugin Setup Wizard Access" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-10567", "datePublished": "2024-12-04T08:22:45.515Z", "dateReserved": "2024-10-30T20:24:50.743Z", "dateUpdated": "2024-12-04T15:01:08.812Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0412
Vulnerability from cvelistv5
Published
2022-02-28 09:06
Modified
2024-08-02 23:25
Severity ?
EPSS score ?
Summary
The TI WooCommerce Wishlist WordPress plugin before 1.40.1, TI WooCommerce Wishlist Pro WordPress plugin before 1.40.1 do not sanitise and escape the item_id parameter before using it in a SQL statement via the wishlist/remove_product REST endpoint, allowing unauthenticated attackers to perform SQL injection attacks
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682 | x_refsource_MISC | |
https://plugins.trac.wordpress.org/changeset/2668899 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | TemplateInvaders | TI WooCommerce Wishlist |
Version: 1.40.1 < 1.40.1 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:25:40.372Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://plugins.trac.wordpress.org/changeset/2668899" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "TI WooCommerce Wishlist", "vendor": "TemplateInvaders", "versions": [ { "lessThan": "1.40.1", "status": "affected", "version": "1.40.1", "versionType": "custom" } ] }, { "product": "TI WooCommerce Wishlist Pro", "vendor": "TemplateInvaders", "versions": [ { "lessThan": "1.40.1", "status": "affected", "version": "1.40.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Krzysztof Zaj\u0105c" } ], "descriptions": [ { "lang": "en", "value": "The TI WooCommerce Wishlist WordPress plugin before 1.40.1, TI WooCommerce Wishlist Pro WordPress plugin before 1.40.1 do not sanitise and escape the item_id parameter before using it in a SQL statement via the wishlist/remove_product REST endpoint, allowing unauthenticated attackers to perform SQL injection attacks" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-28T09:06:56", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://plugins.trac.wordpress.org/changeset/2668899" } ], "source": { "discovery": "EXTERNAL" }, "title": "TI WooCommerce Wishlist \u003c 1.40.1 - Unauthenticated Blind SQL Injection", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2022-0412", "STATE": "PUBLIC", "TITLE": "TI WooCommerce Wishlist \u003c 1.40.1 - Unauthenticated Blind SQL Injection" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "TI WooCommerce Wishlist", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.40.1", "version_value": "1.40.1" } ] } }, { "product_name": "TI WooCommerce Wishlist Pro", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "1.40.1", "version_value": "1.40.1" } ] } } ] }, "vendor_name": "TemplateInvaders" } ] } }, "credit": [ { "lang": "eng", "value": "Krzysztof Zaj\u0105c" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The TI WooCommerce Wishlist WordPress plugin before 1.40.1, TI WooCommerce Wishlist Pro WordPress plugin before 1.40.1 do not sanitise and escape the item_id parameter before using it in a SQL statement via the wishlist/remove_product REST endpoint, allowing unauthenticated attackers to perform SQL injection attacks" } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89 SQL Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/e984ba11-abeb-4ed4-9dad-0bfd539a9682" }, { "name": "https://plugins.trac.wordpress.org/changeset/2668899", "refsource": "CONFIRM", "url": "https://plugins.trac.wordpress.org/changeset/2668899" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-0412", "datePublished": "2022-02-28T09:06:56", "dateReserved": "2022-01-29T00:00:00", "dateUpdated": "2024-08-02T23:25:40.372Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-43917
Vulnerability from cvelistv5
Published
2024-08-29 14:46
Modified
2024-08-29 15:37
Severity ?
EPSS score ?
Summary
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TemplateInvaders TI WooCommerce Wishlist allows SQL Injection.This issue affects TI WooCommerce Wishlist: from n/a through 2.8.2.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
TemplateInvaders | TI WooCommerce Wishlist |
Version: n/a < |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:templateinvaders:ti_woocommerce_wishlist:*:*:*:*:*:wordpress:*:*" ], "defaultStatus": "unknown", "product": "ti_woocommerce_wishlist", "vendor": "templateinvaders", "versions": [ { "lessThanOrEqual": "2.8.2", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-43917", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-29T15:36:13.274534Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T15:37:19.370Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "packageName": "ti-woocommerce-wishlist", "product": "TI WooCommerce Wishlist", "vendor": "TemplateInvaders", "versions": [ { "lessThanOrEqual": "2.8.2", "status": "affected", "version": "n/a", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Rafie Muhammad (Patchstack)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in TemplateInvaders TI WooCommerce Wishlist allows SQL Injection.\u003cp\u003eThis issue affects TI WooCommerce Wishlist: from n/a through 2.8.2.\u003c/p\u003e" } ], "value": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027) vulnerability in TemplateInvaders TI WooCommerce Wishlist allows SQL Injection.This issue affects TI WooCommerce Wishlist: from n/a through 2.8.2." } ], "impacts": [ { "capecId": "CAPEC-66", "descriptions": [ { "lang": "en", "value": "CAPEC-66 SQL Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-29T14:46:35.611Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://patchstack.com/database/vulnerability/ti-woocommerce-wishlist/wordpress-ti-woocommerce-wishlist-plugin-2-8-2-sql-injection-vulnerability?_s_id=cve" } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress TI WooCommerce Wishlist plugin \u003c= 2.8.2 - SQL Injection vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2024-43917", "datePublished": "2024-08-29T14:46:35.611Z", "dateReserved": "2024-08-18T21:55:54.397Z", "dateUpdated": "2024-08-29T15:37:19.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }