Vulnerabilities > Rextheme
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-10-21 | CVE-2024-49293 | Missing Authorization vulnerability in Rextheme WP VR Missing Authorization vulnerability in Rextheme WP VR allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP VR: from n/a through 8.5.4. | 5.4 |
2024-01-08 | CVE-2023-6529 | Cross-site Scripting vulnerability in Rextheme WP VR The WP VR WordPress plugin before 8.3.15 does not authorisation and CSRF in a function hooked to admin_init, allowing unauthenticated users to downgrade the plugin, thus leading to Reflected or Stored XSS, as previous versions have such vulnerabilities. | 6.1 |
2023-09-27 | CVE-2023-40663 | Unspecified vulnerability in Rextheme WP VR Unauth. | 6.1 |
2023-05-04 | CVE-2022-47449 | Unspecified vulnerability in Rextheme Cart Lift - Abandoned Cart Recovery for Woocommerce and EDD Unauth. | 6.1 |
2023-04-24 | CVE-2023-1414 | Missing Authorization vulnerability in Rextheme WP VR The WP VR WordPress plugin before 8.3.0 does not have authorisation and CSRF checks in various AJAX actions, one in particular could allow any authenticated users, such as subscriber to update arbitrary tours | 4.3 |
2023-04-17 | CVE-2023-1413 | Unspecified vulnerability in Rextheme WP VR The WP VR WordPress plugin before 8.2.9 does not sanitise and escape some parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | 6.1 |
2023-03-15 | CVE-2023-25708 | Unspecified vulnerability in Rextheme WP VR Cross-Site Request Forgery (CSRF) vulnerability in Rextheme WP VR – 360 Panorama and Virtual Tour Builder For WordPress plugin <= 8.2.7 versions. | 8.8 |
2023-02-06 | CVE-2023-0174 | Cross-site Scripting vulnerability in Rextheme WP VR The WP VR WordPress plugin before 8.2.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. | 5.4 |