Skip to content

Commit 34a820b

Browse files
committed
Auto-Update: 2025-03-19T07:00:23.443217+00:00
1 parent e43f358 commit 34a820b

File tree

12 files changed

+553
-9
lines changed

12 files changed

+553
-9
lines changed
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"id": "CVE-2024-12295",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-19T05:15:39.603",
5+
"lastModified": "2025-03-19T05:15:39.603",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The BoomBox Theme Extensions plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.8.0. This is due to the plugin not properly validating a user's identity prior to updating their password through the 'boombox_ajax_reset_password' function. This makes it possible for authenticated attackers, with subscriber-level privileges and above, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Primary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
22+
"baseScore": 8.8,
23+
"baseSeverity": "HIGH",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "LOW",
27+
"userInteraction": "NONE",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "HIGH",
30+
"integrityImpact": "HIGH",
31+
"availabilityImpact": "HIGH"
32+
},
33+
"exploitabilityScore": 2.8,
34+
"impactScore": 5.9
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "[email protected]",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-640"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://themeforest.net/item/boombox-viral-buzz-wordpress-theme/16596434",
53+
"source": "[email protected]"
54+
},
55+
{
56+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c453aaf6-767d-4929-bbb3-3c0b78b0507a?source=cve",
57+
"source": "[email protected]"
58+
}
59+
]
60+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"id": "CVE-2024-12922",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-19T06:15:15.120",
5+
"lastModified": "2025-03-19T06:15:15.120",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The Altair theme for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check within functions.php in all versions up to, and including, 5.2.4. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Primary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
22+
"baseScore": 9.8,
23+
"baseSeverity": "CRITICAL",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "NONE",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "HIGH",
30+
"integrityImpact": "HIGH",
31+
"availabilityImpact": "HIGH"
32+
},
33+
"exploitabilityScore": 3.9,
34+
"impactScore": 5.9
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "[email protected]",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-862"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://themeforest.net/item/tour-travel-agency-altair-theme/9318575",
53+
"source": "[email protected]"
54+
},
55+
{
56+
"url": "https://themeforest.net/item/tour-travel-agency-altair-theme/9318575#item-description__changelog",
57+
"source": "[email protected]"
58+
},
59+
{
60+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e27971a3-f84c-4f13-81af-127e7560566a?source=cve",
61+
"source": "[email protected]"
62+
}
63+
]
64+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"id": "CVE-2024-50629",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-19T06:15:15.460",
5+
"lastModified": "2025-03-19T06:15:15.460",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "Improper encoding or escaping of output vulnerability in the webapi component in Synology BeeStation Manager (BSM) before 1.1-65374, Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 and Synology Unified Controller (DSMUC) before 3.1.4-23079 allows remote attackers to read limited files via unspecified vectors."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
22+
"baseScore": 5.3,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "NONE",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "LOW",
30+
"integrityImpact": "NONE",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 3.9,
34+
"impactScore": 1.4
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "[email protected]",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-116"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_20",
53+
"source": "[email protected]"
54+
},
55+
{
56+
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_23",
57+
"source": "[email protected]"
58+
}
59+
]
60+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"id": "CVE-2024-50630",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-19T06:15:15.620",
5+
"lastModified": "2025-03-19T06:15:15.620",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "Missing authentication for critical function vulnerability in the webapi component in Synology Drive Server before 3.0.4-12699, 3.2.1-23280, 3.5.0-26085 and 3.5.1-26102 allows remote attackers to obtain administrator credentials via unspecified vectors."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
22+
"baseScore": 7.5,
23+
"baseSeverity": "HIGH",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "NONE",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "HIGH",
30+
"integrityImpact": "NONE",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 3.9,
34+
"impactScore": 3.6
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "[email protected]",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-306"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_21",
53+
"source": "[email protected]"
54+
}
55+
]
56+
}
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
{
2+
"id": "CVE-2024-50631",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-19T06:15:15.773",
5+
"lastModified": "2025-03-19T06:15:15.773",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in the system syncing daemon in Synology Drive Server before 3.0.4-12699, 3.2.1-23280, 3.5.0-26085 and 3.5.1-26102 allows remote attackers to inject SQL commands, limited to write operations, via unspecified vectors."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Secondary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
22+
"baseScore": 7.5,
23+
"baseSeverity": "HIGH",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "NONE",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "NONE",
30+
"integrityImpact": "HIGH",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 3.9,
34+
"impactScore": 3.6
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "[email protected]",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-89"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://www.synology.com/en-global/security/advisory/Synology_SA_24_21",
53+
"source": "[email protected]"
54+
}
55+
]
56+
}
+21
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
{
2+
"id": "CVE-2025-1232",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-19T06:15:15.940",
5+
"lastModified": "2025-03-19T06:15:15.940",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The Site Reviews WordPress plugin before 7.2.5 does not properly sanitise and escape some of its Review fields, which could allow unauthenticated users to perform Stored XSS attacks"
12+
}
13+
],
14+
"metrics": {},
15+
"references": [
16+
{
17+
"url": "https://wpscan.com/vulnerability/c4ea8357-ddd7-48ac-80c9-15b924715b14/",
18+
"source": "[email protected]"
19+
}
20+
]
21+
}
+60
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,60 @@
1+
{
2+
"id": "CVE-2025-2290",
3+
"sourceIdentifier": "[email protected]",
4+
"published": "2025-03-19T05:15:41.180",
5+
"lastModified": "2025-03-19T05:15:41.180",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "The LifterLMS \u2013 WP LMS for eLearning, Online Courses, & Quizzes plugin for WordPress is vulnerable to Unauthenticated Post Trashing due to a missing capability check on the delete_access_plan function and the related AJAX calls in all versions up to, and including, 8.0.1. This makes it possible for unauthenticated attackers to change status to \"Trash\" for every published post, therefore limiting the availability of the website's content."
12+
}
13+
],
14+
"metrics": {
15+
"cvssMetricV31": [
16+
{
17+
"source": "[email protected]",
18+
"type": "Primary",
19+
"cvssData": {
20+
"version": "3.1",
21+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
22+
"baseScore": 5.3,
23+
"baseSeverity": "MEDIUM",
24+
"attackVector": "NETWORK",
25+
"attackComplexity": "LOW",
26+
"privilegesRequired": "NONE",
27+
"userInteraction": "NONE",
28+
"scope": "UNCHANGED",
29+
"confidentialityImpact": "NONE",
30+
"integrityImpact": "LOW",
31+
"availabilityImpact": "NONE"
32+
},
33+
"exploitabilityScore": 3.9,
34+
"impactScore": 1.4
35+
}
36+
]
37+
},
38+
"weaknesses": [
39+
{
40+
"source": "[email protected]",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-862"
46+
}
47+
]
48+
}
49+
],
50+
"references": [
51+
{
52+
"url": "https://plugins.trac.wordpress.org/changeset/3257328/lifterlms/trunk/includes/class.llms.ajax.handler.php",
53+
"source": "[email protected]"
54+
},
55+
{
56+
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4f64dbf2-b75a-4a35-9b4e-413b8fd1fff0?source=cve",
57+
"source": "[email protected]"
58+
}
59+
]
60+
}

0 commit comments

Comments
 (0)