Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress

Information

Software Type Plugin
Software Slug wp-user-avatar (view on wordpress.org)
Software Status Active
Software Author collizo4sky
Software Website profilepress.com
Software Downloads 12,529,587
Software Active Installs 200,000
Software Record Last Updated February 26, 2024

Showing 1-20 of 26 Vulnerabilities

Title CVE ID CVSS Researchers Date
ProfilePress <= 4.15.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via profilepress-edit-profile Shortcode CVE-2024-1806 6.4 wesley (wcraft) February 23, 2024
Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.15.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via [reg-select-role] Shortcode CVE-2024-1409 6.4 Ngô Thiên An (ancorn_) February 22, 2024
ProfilePress <= 4.14.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode CVE-2024-1570 6.4 Arkadiusz Hydzik February 19, 2024
ProfilePress <= 4.14.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via [edit-profile-text-box] shortcode CVE-2024-1408 6.4 Arkadiusz Hydzik February 19, 2024
Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.14.4 - Unauthenticated Stored Cross-Site Scripting CVE-2024-1519 6.5 stealthcopter February 19, 2024
Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.14.3 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-1046 6.4 Ngô Thiên An (ancorn_) February 1, 2024
ProfilePress <= 4.13.2 - Information Disclosure via Debug Log CVE-2023-44150 5.3 Joshua Chan, Revan Arifio October 2, 2023
ProfilePress <= 4.13.1 - Limited Privilege Escalation via 'acceptable_defined_roles' CVE-2023-41954 7.3 Revan Arifio September 9, 2023
ProfilePress <= 4.13.1 Cross-Site Request Forgery via 'admin_notice' CVE-2023-41953 4.3 Abdi Pranata September 9, 2023
ProfilePress <= 4.10.3 - Reflected Cross-Site Scripting via error message 6.1 June 23, 2023
ProfilePress <= 4.5.3 - Unauthenticated Cross-Site Scripting CVE-2022-47444 7.2 pilvar March 27, 2023
ProfilePress <= 4.5.4 - Unauthenticated Stored Cross-Site Scripting CVE-2023-23830 7.2 Rafie Muhammad February 21, 2023
ProfilePress <= 4.5.4 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcodes CVE-2023-23820 6.4 Rafie Muhammad February 20, 2023
ProfilePress <= 4.5.3 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-23996 5.5 Rio Darmawan January 20, 2023
ProfilePress <= 4.5.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via Form Settings CVE-2022-4698 5.5 Ivan Kuzymchak December 23, 2022
ProfilePress <= 4.5.0 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2022-4697 5.5 Marco Wotschka December 23, 2022
ProfilePress <= 4.3.2 - Authenticated (Admin+) PHP Object Injection CVE-2022-45083 6.6 Thura Moe Myint December 14, 2022
WordPress Membership, User Registration, Login Form, User Profile & Restrict Content Plugin – ProfilePress <= 3.2.15 - Reflected Cross-Site Scripting 6.1 July 22, 2022
ProfilePress <= 3.2.2 - Reflected Cross-Site Scripting via ppress_cc_data Parameter CVE-2021-24954 6.1 ZhongFu Su November 15, 2021
ProfilePress <= 3.2.2 - Reflected Cross-Site Scripting CVE-2021-24955 6.1 ZhongFu Su November 15, 2021

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation