TomS

Vulnerabilities Discovered:

7
All Time Discoveries
0
Discoveries since Aug 24, 2023

7 vulnerabilities

Title CVE ID CVSS Vector Date
Kanban Boards <= 2.5.21 - Authenticated (Administrator+) Remote Code Execution CVE-2023-40606 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H August 17, 2023
Kanban Boards for WordPress <= 2.5.20 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-34368 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N June 2, 2023
BSK Forms Blacklist <= 3.6.2 - Authenticated (Administrator+) SQL Injection via 'order' and 'orderby' CVE-2023-30872 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H April 24, 2023
WP Tools <= 3.41 - Missing Authorization leading to Authenticated (Subscriber+) Authorization Bypass CVE-2022-43453 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H November 30, 2022
Easy WP SMTP <= 1.5.1 - Authenticated (Admin+) Arbitrary File Deletion CVE-2022-45829 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H November 30, 2022
Easy WP SMTP <= 1.5.1 - Authenticated (Admin+) Remote Code Execution CVE-2022-42699 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H November 30, 2022
Easy WP SMTP <= 1.5.1 - Authenticated (Admin+) Directory Traversal CVE-2022-45833 2.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N November 30, 2022

Share this researcher's vulnerability discoveries

All the threat data shared in this database is powered by Wordfence Intelligence Enterprise.
Interested in integrating this data into your platform or network?
Contact us now to discuss API access to our Wordfence Intelligence Enterprise Data Feeds.

Inquire Now

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation