Vulnerabilities > WP BUY

DATE CVE VULNERABILITY TITLE RISK
2024-10-20 CVE-2024-49306 Cross-Site Request Forgery (CSRF) vulnerability in Wp-Buy WP Content Copy Protection & NO Right Click
Cross-Site Request Forgery (CSRF) vulnerability in WP-buy WP Content Copy Protection & No Right Click allows Cross Site Request Forgery.This issue affects WP Content Copy Protection & No Right Click: from n/a through 3.5.9.
network
low complexity
wp-buy CWE-352
8.8
2023-08-05 CVE-2023-36678 Unspecified vulnerability in Wp-Buy WP Content Copy Protection & NO Right Click
Auth.
network
low complexity
wp-buy
4.8
2023-01-23 CVE-2022-4305 Unspecified vulnerability in Wp-Buy Login AS User or Customer (User Switching)
The Login as User or Customer WordPress plugin before 3.3 lacks authorization checks to ensure that users are allowed to log in as another one, which could allow unauthenticated attackers to obtain a valid admin session.
network
low complexity
wp-buy
critical
9.8
2022-02-21 CVE-2022-23983 Cross-Site Request Forgery (CSRF) vulnerability in Wp-Buy WP Content Copy Protection & NO Right Click
Cross-Site Request Forgery (CSRF) vulnerability leading to plugin Settings Update discovered in WP Content Copy Protection & No Right Click WordPress plugin (versions <= 3.4.4).
network
low complexity
wp-buy CWE-352
8.8
2021-11-17 CVE-2021-24847 Unspecified vulnerability in Wp-Buy SEO Redirection-301 Redirect Manager
The importFromRedirection AJAX action of the SEO Redirection Plugin – 301 Redirect Manager WordPress plugin before 8.2, available to any authenticated user, does not properly sanitise the offset parameter before using it in a SQL statement, leading an SQL injection when the redirection plugin is also installed
network
low complexity
wp-buy
8.8
2021-11-08 CVE-2021-24829 SQL Injection vulnerability in Wp-Buy Visitor Traffic Real Time Statistics
The Visitor Traffic Real Time Statistics WordPress plugin before 3.9 does not validate and escape user input passed to the today_traffic_index AJAX action (available to any authenticated users) before using it in a SQL statement, leading to an SQL injection issue
network
low complexity
wp-buy CWE-89
8.8
2021-05-14 CVE-2021-24188 Unspecified vulnerability in Wp-Buy WP Content Copy Protection & NO Right Click
Low privileged users can use the AJAX action 'cp_plugins_do_button_job_later_callback' in the WP Content Copy Protection & No Right Click WordPress plugin before 3.1.5, to install any plugin (including a specific version) from the WordPress repository, as well as activate arbitrary plugin from then blog, which helps attackers install vulnerable plugins and could lead to more critical vulnerabilities like RCE.
network
low complexity
wp-buy
8.8
2021-05-14 CVE-2021-24189 Unspecified vulnerability in Wp-Buy Captchinoo
Low privileged users can use the AJAX action 'cp_plugins_do_button_job_later_callback' in the Captchinoo, Google recaptcha for admin login page WordPress plugin before 2.4, to install any plugin (including a specific version) from the WordPress repository, as well as activate arbitrary plugin from then blog, which helps attackers install vulnerable plugins and could lead to more critical vulnerabilities like RCE.
network
low complexity
wp-buy
8.8
2021-05-14 CVE-2021-24190 Unspecified vulnerability in Wp-Buy Conditional Marketing Mailer
Low privileged users can use the AJAX action 'cp_plugins_do_button_job_later_callback' in the WooCommerce Conditional Marketing Mailer WordPress plugin before 1.5.2, to install any plugin (including a specific version) from the WordPress repository, as well as activate arbitrary plugin from then blog, which helps attackers install vulnerable plugins and could lead to more critical vulnerabilities like RCE.
network
low complexity
wp-buy
8.8
2021-05-14 CVE-2021-24193 Unspecified vulnerability in Wp-Buy Visitor Traffic Real Time Statistics
Low privileged users can use the AJAX action 'cp_plugins_do_button_job_later_callback' in the Visitor Traffic Real Time Statistics WordPress plugin before 2.12, to install any plugin (including a specific version) from the WordPress repository, as well as activate arbitrary plugin from then blog, which helps attackers install vulnerable plugins and could lead to more critical vulnerabilities like RCE.
network
low complexity
wp-buy
8.8