Filtered by CWE-862
Total 5189 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2023-26510 1 Ghost 1 Ghost 2025-03-06 5.7 Medium
Ghost 5.35.0 allows authorization bypass: contributors can view draft posts of other users, which is arguably inconsistent with a security policy in which a contributor's draft can only be read by editors until published by an editor. NOTE: the vendor's position is that this behavior has no security impact.
CVE-2024-10860 1 Xlplugins 1 Nextmove 2025-03-06 4.3 Medium
The NextMove Lite – Thank You Page for WooCommerce plugin for WordPress is vulnerable to unauthorized submission of data due to a missing capability check on the _submit_uninstall_reason_action() function in all versions up to, and including, 2.19.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit a deactivation reason on behalf of a site.
CVE-2022-47483 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2022-47482 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2022-47481 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2022-47480 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2025-1891 1 Qzw1210 1 Shishuocms 2025-03-05 4.3 Medium
A vulnerability was found in shishuocms 1.1 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
CVE-2023-22858 1 Blogengine 1 Blogengine.net 2025-03-05 5.3 Medium
An Improper Access Control vulnerability in BlogEngine.NET 3.3.8.0, allows unauthenticated visitors to access the files of unpublished blogs.
CVE-2023-26957 1 Onekeyadmin 1 Onekeyadmin 2025-03-05 9.1 Critical
onekeyadmin v1.3.9 was discovered to contain an arbitrary file delete vulnerability via the component \admin\controller\plugins.
CVE-2022-47471 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2022-47461 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 6.7 Medium
In telephone service, there is a missing permission check. This could lead to local escalation of privilege with system execution privileges needed.
CVE-2022-47462 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 6.7 Medium
In telephone service, there is a missing permission check. This could lead to local escalation of privilege with system execution privileges needed.
CVE-2022-47472 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2022-47473 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local information disclosure with no additional execution privileges needed.
CVE-2022-47484 2 Google, Unisoc 14 Android, S8000, Sc7731e and 11 more 2025-03-05 5.5 Medium
In telephony service, there is a missing permission check. This could lead to local denial of service in telephone service with no additional execution privileges needed.
CVE-2025-1639 1 Crowdytheme 1 Arolax 2025-03-05 8.8 High
The Animation Addons for Elementor Pro plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_elementor_plugin_handler() function in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to further infect a victim when Elementor is not activated on a vulnerable site.
CVE-2024-8682 2025-03-05 5.3 Medium
The JNews - WordPress Newspaper Magazine Blog AMP Theme theme for WordPress is vulnerable to unauthorized user registration in all versions up to, and including, 11.6.6. This is due to the plugin not properly validate if the user can register option is enabled prior to creating a user though the register_handler() function. This makes it possible for unauthenticated attackers to register as a user even when user registration is disabled.
CVE-2023-6731 1 Generatepress 1 Wp Show Posts 2025-03-05 4.3 Medium
The WP Show Posts plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple AJAX functions in all versions up to, and including, 1.1.5. This makes it possible for authenticated attackers, with subscriber access and above, to view arbitrary post metadata, list posts, and view terms and taxonomies.
CVE-2024-13780 2025-03-05 6.5 Medium
The Hero Mega Menu - Responsive WordPress Menu Plugin plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the hmenu_delete_menu() function in all versions up to, and including, 1.16.5. This makes it possible for unauthenticated attackers to delete arbitrary directories on the server.
CVE-2024-13747 2025-03-05 4.3 Medium
The WooMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'template_delete_saved' function in all versions up to, and including, 3.0.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject SQL into an existing post deletion query.