Filtered by vendor Xtendify Subscriptions
Total 12 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-7694 3 Wofficeio, Wordpress, Xtendify 3 Woffice Core, Wordpress, Woffice 2025-08-12 6.8 Medium
The Woffice Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the woffice_file_manager_delete() function in all versions up to, and including, 5.4.26. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).
CVE-2024-37470 2 Wofficeio, Xtendify 2 Woffice Core, Woffice 2025-08-11 8.2 High
Missing Authorization vulnerability in WofficeIO Woffice Core allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Woffice Core: from n/a through 5.4.8.
CVE-2024-43153 1 Xtendify 1 Woffice 2025-08-09 9.8 Critical
Improper Privilege Management vulnerability in WofficeIO Woffice allows Privilege Escalation.This issue affects Woffice: from n/a through 5.4.10.
CVE-2025-2780 3 Wofficeio, Wordpress, Xtendify 3 Woffice Core, Wordpress, Woffice 2025-08-08 8.8 High
The Woffice Core plugin for WordPress, used by the Woffice Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'saveFeaturedImage' function in all versions up to, and including, 5.4.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
CVE-2025-2797 3 Wofficeio, Wordpress, Xtendify 3 Woffice Core, Wordpress, Woffice 2025-08-08 5.4 Medium
The Woffice Core plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.4.21. This is due to missing or incorrect nonce validation on the 'woffice_handle_user_approval_actions' function. This makes it possible for unauthenticated attackers to approve registration for any user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVE-2025-2798 1 Xtendify 1 Woffice 2025-08-08 9.8 Critical
The Woffice CRM theme for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 5.4.21. This is due to a misconfiguration of excluded roles during registration. This makes it possible for unauthenticated attackers to register with an Administrator role if a custom login form is being used. This can be combined with CVE-2025-2797 to bypass the user approval process if an Administrator can be tricked into taking an action such as clicking a link.
CVE-2024-43234 1 Xtendify 1 Woffice 2025-08-08 9.8 Critical
Authentication Bypass Using an Alternate Path or Channel vulnerability in WofficeIO Woffice allows Authentication Bypass.This issue affects Woffice: from n/a through 5.4.14.
CVE-2024-37472 1 Xtendify 1 Woffice 2025-03-27 7.1 High
Cross Site Scripting (XSS) vulnerability in WofficeIO Woffice allows Reflected XSS.This issue affects Woffice: from n/a through 5.4.8.
CVE-2024-37471 1 Xtendify 1 Woffice 2025-03-14 7.1 High
Cross Site Scripting (XSS) vulnerability in WofficeIO Woffice Core allows Reflected XSS.This issue affects Woffice Core: from n/a through 5.4.8.
CVE-2023-46189 1 Xtendify 1 Simple Calendar 2024-11-21 4.3 Medium
Cross-Site Request Forgery (CSRF) vulnerability in Simple Calendar – Google Calendar Plugin <= 3.2.5 versions.
CVE-2023-32738 1 Xtendify 1 Eonet Manual User Approve 2024-11-21 5.9 Medium
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alkaweb Eonet Manual User Approve plugin <= 2.1.3 versions.
CVE-2024-8549 1 Xtendify 1 Simple Calendar 2024-10-02 6.1 Medium
The Simple Calendar – Google Calendar Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.4.2. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.