Vulnerabilites related to Unknown - WP VR
cve-2023-1413
Vulnerability from cvelistv5
Published
2023-04-17 12:17
Modified
2024-08-02 05:49
Severity ?
EPSS score ?
Summary
The WP VR WordPress plugin before 8.2.9 does not sanitise and escape some parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/6938fee5-3510-45e6-8112-c9e2b30f6881 | exploit, vdb-entry, technical-description |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:49:11.364Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "exploit", "vdb-entry", "technical-description", "x_transferred", ], url: "https://wpscan.com/vulnerability/6938fee5-3510-45e6-8112-c9e2b30f6881", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { collectionURL: "https://wordpress.org/plugins", defaultStatus: "unaffected", product: "WP VR", vendor: "Unknown", versions: [ { lessThan: "8.2.9", status: "affected", version: "0", versionType: "custom", }, ], }, ], credits: [ { lang: "en", type: "finder", value: "Erwan LR (WPScan)", }, { lang: "en", type: "coordinator", value: "WPScan", }, ], descriptions: [ { lang: "en", value: "The WP VR WordPress plugin before 8.2.9 does not sanitise and escape some parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin", }, ], problemTypes: [ { descriptions: [ { description: "CWE-79 Cross-Site Scripting (XSS)", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-17T12:17:47.151Z", orgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", shortName: "WPScan", }, references: [ { tags: [ "exploit", "vdb-entry", "technical-description", ], url: "https://wpscan.com/vulnerability/6938fee5-3510-45e6-8112-c9e2b30f6881", }, ], source: { discovery: "EXTERNAL", }, title: "WP VR < 8.2.9 - Reflected XSS", x_generator: { engine: "WPScan CVE Generator", }, }, }, cveMetadata: { assignerOrgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", assignerShortName: "WPScan", cveId: "CVE-2023-1413", datePublished: "2023-04-17T12:17:47.151Z", dateReserved: "2023-03-15T14:48:18.738Z", dateUpdated: "2024-08-02T05:49:11.364Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-0174
Vulnerability from cvelistv5
Published
2023-02-06 19:59
Modified
2025-03-25 20:42
Severity ?
EPSS score ?
Summary
The WP VR WordPress plugin before 8.2.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/6b53d0e6-def9-4907-bd2b-884b2afa52b3 | exploit, vdb-entry, technical-description |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:02:44.048Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "exploit", "vdb-entry", "technical-description", "x_transferred", ], url: "https://wpscan.com/vulnerability/6b53d0e6-def9-4907-bd2b-884b2afa52b3", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2023-0174", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-03-25T20:42:37.040723Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-03-25T20:42:58.406Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { collectionURL: "https://wordpress.org/plugins", defaultStatus: "unaffected", product: "WP VR", vendor: "Unknown", versions: [ { lessThan: "8.2.7", status: "affected", version: "0", versionType: "custom", }, ], }, ], credits: [ { lang: "en", type: "finder", value: "Lana Codes", }, { lang: "en", type: "coordinator", value: "WPScan", }, ], descriptions: [ { lang: "en", value: "The WP VR WordPress plugin before 8.2.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.", }, ], problemTypes: [ { descriptions: [ { description: "CWE-79 Cross-Site Scripting (XSS)", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-02-06T19:59:14.952Z", orgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", shortName: "WPScan", }, references: [ { tags: [ "exploit", "vdb-entry", "technical-description", ], url: "https://wpscan.com/vulnerability/6b53d0e6-def9-4907-bd2b-884b2afa52b3", }, ], source: { discovery: "EXTERNAL", }, title: "WP VR < 8.2.7 - Contributor+ Stored XSS", x_generator: { engine: "WPScan CVE Generator", }, }, }, cveMetadata: { assignerOrgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", assignerShortName: "WPScan", cveId: "CVE-2023-0174", datePublished: "2023-02-06T19:59:14.952Z", dateReserved: "2023-01-11T03:09:59.832Z", dateUpdated: "2025-03-25T20:42:58.406Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-1414
Vulnerability from cvelistv5
Published
2023-04-24 18:31
Modified
2025-02-04 16:08
Severity ?
EPSS score ?
Summary
The WP VR WordPress plugin before 8.3.0 does not have authorisation and CSRF checks in various AJAX actions, one in particular could allow any authenticated users, such as subscriber to update arbitrary tours
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/d61d4be7-9251-4c62-8fb7-8a456aa6969e | exploit, vdb-entry, technical-description |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T05:49:11.054Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "exploit", "vdb-entry", "technical-description", "x_transferred", ], url: "https://wpscan.com/vulnerability/d61d4be7-9251-4c62-8fb7-8a456aa6969e", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 4.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2023-1414", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-02-04T16:07:55.438492Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-04T16:08:00.755Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { collectionURL: "https://wordpress.org/plugins", defaultStatus: "unaffected", product: "WP VR", vendor: "Unknown", versions: [ { lessThan: "8.3.0", status: "affected", version: "0", versionType: "custom", }, ], }, ], credits: [ { lang: "en", type: "finder", value: "Erwan LR (WPScan)", }, { lang: "en", type: "coordinator", value: "WPScan", }, ], descriptions: [ { lang: "en", value: "The WP VR WordPress plugin before 8.3.0 does not have authorisation and CSRF checks in various AJAX actions, one in particular could allow any authenticated users, such as subscriber to update arbitrary tours", }, ], problemTypes: [ { descriptions: [ { description: "CWE-862 Missing Authorization", lang: "en", type: "CWE", }, ], }, { descriptions: [ { description: "CWE-352 Cross-Site Request Forgery (CSRF)", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2023-04-24T18:31:02.339Z", orgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", shortName: "WPScan", }, references: [ { tags: [ "exploit", "vdb-entry", "technical-description", ], url: "https://wpscan.com/vulnerability/d61d4be7-9251-4c62-8fb7-8a456aa6969e", }, ], source: { discovery: "EXTERNAL", }, title: "WP VR < 8.3.0 - Subscriber+ Arbitrary Tour Update", x_generator: { engine: "WPScan CVE Generator", }, }, }, cveMetadata: { assignerOrgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", assignerShortName: "WPScan", cveId: "CVE-2023-1414", datePublished: "2023-04-24T18:31:02.339Z", dateReserved: "2023-03-15T14:48:28.665Z", dateUpdated: "2025-02-04T16:08:00.755Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2023-6529
Vulnerability from cvelistv5
Published
2024-01-08 19:00
Modified
2024-08-02 08:35
Severity ?
EPSS score ?
Summary
The WP VR WordPress plugin before 8.3.15 does not authorisation and CSRF in a function hooked to admin_init, allowing unauthenticated users to downgrade the plugin, thus leading to Reflected or Stored XSS, as previous versions have such vulnerabilities.
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/c36314c1-a2c0-4816-93c9-e61f9cf7f27a | exploit, vdb-entry, technical-description |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-02T08:35:14.624Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "exploit", "vdb-entry", "technical-description", "x_transferred", ], url: "https://wpscan.com/vulnerability/c36314c1-a2c0-4816-93c9-e61f9cf7f27a", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { collectionURL: "https://wordpress.org/plugins", defaultStatus: "unaffected", product: "WP VR", vendor: "Unknown", versions: [ { lessThan: "8.3.15", status: "affected", version: "0", versionType: "semver", }, ], }, ], credits: [ { lang: "en", type: "finder", value: "Krzysztof Zając (CERT PL)", }, { lang: "en", type: "coordinator", value: "WPScan", }, ], descriptions: [ { lang: "en", value: "The WP VR WordPress plugin before 8.3.15 does not authorisation and CSRF in a function hooked to admin_init, allowing unauthenticated users to downgrade the plugin, thus leading to Reflected or Stored XSS, as previous versions have such vulnerabilities.", }, ], problemTypes: [ { descriptions: [ { description: "CWE-284 Improper Access Control", lang: "en", type: "CWE", }, ], }, { descriptions: [ { description: "CWE-352 Cross-Site Request Forgery (CSRF)", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-01-08T19:00:26.949Z", orgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", shortName: "WPScan", }, references: [ { tags: [ "exploit", "vdb-entry", "technical-description", ], url: "https://wpscan.com/vulnerability/c36314c1-a2c0-4816-93c9-e61f9cf7f27a", }, ], source: { discovery: "EXTERNAL", }, title: "WP VR < 8.3.15 - Unauthenticated Plugin Downgrade leading to XSS", x_generator: { engine: "WPScan CVE Generator", }, }, }, cveMetadata: { assignerOrgId: "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", assignerShortName: "WPScan", cveId: "CVE-2023-6529", datePublished: "2024-01-08T19:00:26.949Z", dateReserved: "2023-12-05T16:45:09.724Z", dateUpdated: "2024-08-02T08:35:14.624Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }