Vulnerabilities > Codeastrology

DATE CVE VULNERABILITY TITLE RISK
2024-07-06 CVE-2024-37554 Cross-site Scripting vulnerability in Codeastrology Ultraaddons
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeAstrology Team UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode).This issue affects UltraAddons Elementor Lite (Header & Footer Builder, Menu Builder, Cart Icon, Shortcode): from n/a through 1.1.6.
network
low complexity
codeastrology CWE-79
5.4
2023-12-18 CVE-2023-49153 Cross-Site Request Forgery (CSRF) vulnerability in Codeastrology ADD to Cart Text Changer and Customize Button, ADD Custom Icon
Cross-Site Request Forgery (CSRF) vulnerability in Saiful Islam Add to Cart Text Changer and Customize Button, Add Custom Icon.This issue affects Add to Cart Text Changer and Customize Button, Add Custom Icon: from n/a through 2.0.
network
low complexity
codeastrology CWE-352
8.8
2023-12-18 CVE-2023-48768 Cross-Site Request Forgery (CSRF) vulnerability in Codeastrology Quantity Plus Minus Button for Woocommerce
Cross-Site Request Forgery (CSRF) vulnerability in CodeAstrology Team Quantity Plus Minus Button for WooCommerce by CodeAstrology.This issue affects Quantity Plus Minus Button for WooCommerce by CodeAstrology: from n/a through 1.1.9.
network
low complexity
codeastrology CWE-352
8.8
2023-09-11 CVE-2023-4270 Unspecified vulnerability in Codeastrology MIN MAX Control
The Min Max Control WordPress plugin before 4.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
network
low complexity
codeastrology
6.1
2022-04-18 CVE-2022-1020 Unspecified vulnerability in Codeastrology WOO Product Table
The Product Table for WooCommerce (wooproducttable) WordPress plugin before 3.1.2 does not have authorisation and CSRF checks in the wpt_admin_update_notice_option AJAX action (available to both unauthenticated and authenticated users), as well as does not validate the callback parameter, allowing unauthenticated attackers to call arbitrary functions with either none or one user controlled argument
network
low complexity
codeastrology
critical
9.8