Alex Thomas

Vulnerabilities Discovered:

27
All Time Discoveries
21
Discoveries since May 11, 2023

Showing 1-20 of 27 vulnerabilities

Title CVE ID CVSS Vector Date
GD Mail Queue <= 3.9.3 - Unauthenticated Stored Cross-Site Scripting via Email CVE-2023-3122 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N June 9, 2023
WP Mail Catcher <= 2.1.2 - Unauthenticated Stored Cross-Site Scripting via Email Subject CVE-2023-3080 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N June 9, 2023
Elementor Addons, Widgets and Enhancements – Stax <= 1.4.3 - Missing Authorization in toggle_widget CVE-2023-2189 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N June 8, 2023
Elementor Addons, Widgets and Enhancements – Stax <= 1.4.3 - Cross-Site Request Forgery via toggle_widget CVE-2023-1807 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N June 8, 2023
Lana Email Logger <= 1.0.2 - Unauthenticated Stored Cross-Site Scripting via Email Subject CVE-2023-3166 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N June 8, 2023
WP Mail Logging <= 1.11.0 - Unauthenticated Stored Cross-Site Scripting via Email CVE-2023-3081 7.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N June 8, 2023
WP EasyCart <= 5.4.10 - Authenticated (Administrator+) SQL Injection via 'orderby' CVE-2023-3023 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H June 8, 2023
Directorist <= 7.5.4 - Authenticated (Subscriber+) Arbitrary User Password Reset to Privilege Escalation CVE-2023-1888 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H June 1, 2023
Directorist <= 7.5.4 - Authenticated (Subscriber+) Insecure Direct Object Reference to Arbitrary Post Deletion in listing_task CVE-2023-1889 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N June 1, 2023
Brizy Page Builder <= 2.4.18 - IP Address Spoofing to Protection Mechanism Bypass CVE-2023-2897 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N May 31, 2023
Draw Attention <= 2.0.11 - Missing Authorization to Arbitrary Post Featured Image Modification CVE-2023-2764 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N May 30, 2023
WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_bulk_activate_product CVE-2023-2895 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 27, 2023
WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_duplicate_product CVE-2023-2896 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 27, 2023
WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_deactivate_product CVE-2023-2893 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 27, 2023
WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_bulk_deactivate_product CVE-2023-2894 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 27, 2023
WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_bulk_delete_product CVE-2023-2892 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N May 27, 2023
WP EasyCart <= 5.4.8 - Cross-Site Request Forgery via process_delete_product CVE-2023-2891 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N May 27, 2023
WPCS – WordPress Currency Switcher Professional <= 1.1.9 - Missing Authorization to Arbitrary Custom Drop-Down Currency Switcher Deletion CVE-2023-2556 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N May 12, 2023
WPCS – WordPress Currency Switcher Professional <= 1.1.9 - Missing Authorization to Arbitrary Custom Drop-Down Currency Switcher Editing CVE-2023-2557 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N May 12, 2023
WPCS – WordPress Currency Switcher Professional <= 1.1.9 - Missing Authorization to Custom Drop-Down Currency Switcher Creation CVE-2023-2555 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N May 12, 2023

Share this researcher's vulnerability discoveries

All the threat data shared in this database is powered by Wordfence Intelligence Enterprise.
Interested in integrating this data into your platform or network?
Contact us now to discuss API access to our Wordfence Intelligence Enterprise Data Feeds.

Inquire Now

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation