All the vulnerabilites related to tagDiv - tagDiv Composer
cve-2024-3814
Vulnerability from cvelistv5
Published
2024-06-15 02:01
Modified
2024-08-01 20:20
Severity ?
EPSS score ?
Summary
tagDiv Composer <= 4.8 - Authenticated (Author+) Stored Cross-Site Scripting via Attachment Meta
References
Impacted products
▼ | Vendor | Product |
---|---|---|
tagDiv | tagDiv Composer |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3814", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-29T18:31:09.306738Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-29T18:31:17.434Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:01.851Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c2a88c3-5c11-4b42-b8f8-aafecf6c4c74?source=cve" }, { "tags": [ "x_transferred" ], "url": "https://tagdiv.com/tagdiv-composer-page-builder-basics/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "tagDiv Composer", "vendor": "tagDiv", "versions": [ { "lessThanOrEqual": "4.8", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Istv\u00e1n M\u00e1rton" } ], "descriptions": [ { "lang": "en", "value": "The tagDiv Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin\u0027s \u0027single\u0027 module in all versions up to, and including, 4.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-15T02:01:58.903Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c2a88c3-5c11-4b42-b8f8-aafecf6c4c74?source=cve" }, { "url": "https://tagdiv.com/tagdiv-composer-page-builder-basics/" } ], "timeline": [ { "lang": "en", "time": "2024-04-15T00:00:00.000+00:00", "value": "Discovered" }, { "lang": "en", "time": "2024-04-15T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2024-04-18T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "tagDiv Composer \u003c= 4.8 - Authenticated (Author+) Stored Cross-Site Scripting via Attachment Meta" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-3814", "datePublished": "2024-06-15T02:01:58.903Z", "dateReserved": "2024-04-15T13:18:04.698Z", "dateUpdated": "2024-08-01T20:20:01.851Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5212
Vulnerability from cvelistv5
Published
2024-08-31 04:29
Modified
2024-09-03 18:02
Severity ?
EPSS score ?
Summary
tagDiv Composer <= 5.0 - Reflected Cross-Site Scripting via envato_code[]
References
Impacted products
▼ | Vendor | Product |
---|---|---|
tagDiv | tagDiv Composer |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:tagdiv:composer:*:*:*:*:*:wordpress:*:*" ], "defaultStatus": "unknown", "product": "composer", "vendor": "tagdiv", "versions": [ { "lessThanOrEqual": "5.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5212", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T18:01:28.147543Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T18:02:42.074Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "tagDiv Composer", "vendor": "tagDiv", "versions": [ { "lessThanOrEqual": "5.0", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Truoc Phan" } ], "descriptions": [ { "lang": "en", "value": "The tagDiv Composer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018envato_code[]\u2019 parameter in all versions up to, and including, 5.0 due to insufficient input sanitization and output escaping within the on_ajax_register_forum_user function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-31T04:29:19.112Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db95415a-5354-498b-8368-58c47d9948de?source=cve" }, { "url": "https://tagdiv.com/newspaper/" } ], "timeline": [ { "lang": "en", "time": "2024-05-22T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2024-08-30T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "tagDiv Composer \u003c= 5.0 - Reflected Cross-Site Scripting via envato_code[]" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-5212", "datePublished": "2024-08-31T04:29:19.112Z", "dateReserved": "2024-05-22T17:12:18.843Z", "dateUpdated": "2024-09-03T18:02:42.074Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-1705
Vulnerability from cvelistv5
Published
2025-03-28 08:23
Modified
2025-03-28 13:55
Severity ?
EPSS score ?
Summary
tagDiv Composer <= 5.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting
References
Impacted products
▼ | Vendor | Product |
---|---|---|
tagDiv | tagDiv Composer |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-1705", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-28T13:54:53.599431Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-28T13:55:01.328Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "tagDiv Composer", "vendor": "tagDiv", "versions": [ { "lessThanOrEqual": "5.3", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Truoc Phan" } ], "descriptions": [ { "lang": "en", "value": "The tagDiv Composer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.3. This is due to missing or incorrect nonce validation within the td_ajax_get_views AJAX action. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-28T08:23:44.395Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2aaa8c34-cf7b-4630-adc8-cbb534deff89?source=cve" }, { "url": "https://tagdiv.com/tagdiv-composer-page-builder-basics/" }, { "url": "https://themeforest.net/item/newspaper/5489609" }, { "url": "https://tagdiv.com/newspaper-changelog/" } ], "timeline": [ { "lang": "en", "time": "2025-03-27T19:53:56.000+00:00", "value": "Disclosed" } ], "title": "tagDiv Composer \u003c= 5.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2025-1705", "datePublished": "2025-03-28T08:23:44.395Z", "dateReserved": "2025-02-25T23:40:03.384Z", "dateUpdated": "2025-03-28T13:55:01.328Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-13645
Vulnerability from cvelistv5
Published
2025-04-04 05:22
Modified
2025-04-04 13:09
Severity ?
EPSS score ?
Summary
TagDiv Composer <= 5.3 - Unauthenticated Arbitrary PHP Object Instantiation
References
Impacted products
▼ | Vendor | Product |
---|---|---|
tagDiv | tagDiv Composer |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-13645", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-04T13:09:35.163897Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-04T13:09:46.175Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "tagDiv Composer", "vendor": "tagDiv", "versions": [ { "lessThanOrEqual": "5.3", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Michael Mazzolini" } ], "descriptions": [ { "lang": "en", "value": "The tagDiv Composer plugin for WordPress is vulnerable to PHP Object Instantiation in all versions up to, and including, 5.3 via module parameter. This makes it possible for unauthenticated attackers to Instantiate a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present." } ], "metrics": [ { "cvssV3_1": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-04T05:22:44.092Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4124003c-4864-48f1-acba-9a613d9c99ae?source=cve" }, { "url": "https://tagdiv.com/tagdiv-composer-page-builder-basics/" } ], "timeline": [ { "lang": "en", "time": "2024-12-19T00:00:00.000+00:00", "value": "Discovered" }, { "lang": "en", "time": "2025-04-03T16:22:47.000+00:00", "value": "Disclosed" } ], "title": "TagDiv Composer \u003c= 5.3 - Unauthenticated Arbitrary PHP Object Instantiation" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-13645", "datePublished": "2025-04-04T05:22:44.092Z", "dateReserved": "2025-01-23T09:03:08.847Z", "dateUpdated": "2025-04-04T13:09:46.175Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2025-2804
Vulnerability from cvelistv5
Published
2025-03-28 05:23
Modified
2025-03-28 14:35
Severity ?
EPSS score ?
Summary
tagDiv Composer <= 5.3 - Reflected Cross-Site Scripting via 'account_id' and 'account_username'
References
Impacted products
▼ | Vendor | Product |
---|---|---|
tagDiv | tagDiv Composer |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-2804", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-28T14:35:49.548742Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-28T14:35:58.805Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "tagDiv Composer", "vendor": "tagDiv", "versions": [ { "lessThanOrEqual": "5.3", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Truoc Phan" } ], "descriptions": [ { "lang": "en", "value": "The tagDiv Composer plugin for WordPress, used by the Newspaper theme, is vulnerable to Reflected Cross-Site Scripting via the \u0027account_id\u0027 and \u0027account_username\u0027 parameters in all versions up to, and including, 5.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-28T05:23:44.516Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/41ef545a-7de1-406c-8686-57216e697a1b?source=cve" }, { "url": "https://tagdiv.com/td_deploy/Newspaper/changed_files_12.6.9_12.7.html" } ], "timeline": [ { "lang": "en", "time": "2025-03-27T16:33:57.000+00:00", "value": "Disclosed" } ], "title": "tagDiv Composer \u003c= 5.3 - Reflected Cross-Site Scripting via \u0027account_id\u0027 and \u0027account_username\u0027" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2025-2804", "datePublished": "2025-03-28T05:23:44.516Z", "dateReserved": "2025-03-25T21:34:03.548Z", "dateUpdated": "2025-03-28T14:35:58.805Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-3888
Vulnerability from cvelistv5
Published
2024-06-04 04:30
Modified
2024-08-01 20:26
Severity ?
EPSS score ?
Summary
tagDiv Composer <= 4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via button Shortcode
References
Impacted products
▼ | Vendor | Product |
---|---|---|
tagDiv | tagDiv Composer |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3888", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-04T15:12:57.305988Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:32:08.997Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:26:57.228Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/466fc6f3-7b2d-4975-a838-16e27bc9f9b5?source=cve" }, { "tags": [ "x_transferred" ], "url": "https://tagdiv.com/newspaper/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "tagDiv Composer", "vendor": "tagDiv", "versions": [ { "lessThanOrEqual": "4.8", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Truoc Phan" } ], "descriptions": [ { "lang": "en", "value": "The tagDiv Composer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin\u0027s button shortcode in all versions up to, and including, 4.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: The vulnerable code in this plugin is specifically tied to the tagDiv Newspaper theme. If another theme is installed (e.g., NewsMag), this code may not be present." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-04T04:30:30.817Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/466fc6f3-7b2d-4975-a838-16e27bc9f9b5?source=cve" }, { "url": "https://tagdiv.com/newspaper/" } ], "timeline": [ { "lang": "en", "time": "2024-04-16T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2024-06-03T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "tagDiv Composer \u003c= 4.8 - Authenticated (Contributor+) Stored Cross-Site Scripting via button Shortcode" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-3888", "datePublished": "2024-06-04T04:30:30.817Z", "dateReserved": "2024-04-16T16:52:47.097Z", "dateUpdated": "2024-08-01T20:26:57.228Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-39166
Vulnerability from cvelistv5
Published
2023-11-13 16:58
Modified
2024-08-02 18:02
Severity ?
EPSS score ?
Summary
WordPress tagDiv Composer Plugin < 4.4 is vulnerable to Cross Site Request Forgery (CSRF)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
tagDiv | tagDiv Composer |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:02:05.310Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://patchstack.com/database/vulnerability/td-composer/wordpress-tagdiv-composer-plugin-4-1-csrf-to-xss-vulnerability?_s_id=cve" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "tagDiv Composer", "vendor": "tagDiv", "versions": [ { "changes": [ { "at": "4.4", "status": "unaffected" } ], "lessThan": "4.4", "status": "affected", "version": "n/a", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Truoc Phan (Patchstack Alliance)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-Site Request Forgery (CSRF) vulnerability in tagDiv tagDiv Composer allows Cross-Site Scripting (XSS).\u003cp\u003eThis issue affects tagDiv Composer: from n/a before 4.4.\u003c/p\u003e" } ], "value": "Cross-Site Request Forgery (CSRF) vulnerability in tagDiv tagDiv Composer allows Cross-Site Scripting (XSS).This issue affects tagDiv Composer: from n/a before 4.4.\n\n" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-13T16:58:54.003Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://patchstack.com/database/vulnerability/td-composer/wordpress-tagdiv-composer-plugin-4-1-csrf-to-xss-vulnerability?_s_id=cve" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to\u0026nbsp;4.4 or a higher version." } ], "value": "Update to\u00a04.4 or a higher version." } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress tagDiv Composer Plugin \u003c 4.4 is vulnerable to Cross Site Request Forgery (CSRF)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2023-39166", "datePublished": "2023-11-13T16:58:54.003Z", "dateReserved": "2023-07-25T13:50:42.001Z", "dateUpdated": "2024-08-02T18:02:05.310Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-3886
Vulnerability from cvelistv5
Published
2024-08-31 04:29
Modified
2024-09-03 17:55
Severity ?
EPSS score ?
Summary
tagDiv Composer <= 5.0 - Reflected Cross-Site Scripting via envato_code[]
References
Impacted products
▼ | Vendor | Product |
---|---|---|
tagDiv | tagDiv Composer |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:tagdiv:composer:*:*:*:*:*:wordpress:*:*" ], "defaultStatus": "unknown", "product": "composer", "vendor": "tagdiv", "versions": [ { "lessThanOrEqual": "5.0", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-3886", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-03T17:49:56.779915Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-03T17:55:29.799Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "tagDiv Composer", "vendor": "tagDiv", "versions": [ { "lessThanOrEqual": "5.0", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Truoc Phan" } ], "descriptions": [ { "lang": "en", "value": "The tagDiv Composer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018envato_code[]\u2019 parameter in all versions up to, and including, 5.0 due to insufficient input sanitization and output escaping within the on_ajax_check_envato_code function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-31T04:29:19.823Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ed9db9c1-c6b5-459e-9820-ec4ee47b244e?source=cve" }, { "url": "https://tagdiv.com/newspaper/" } ], "timeline": [ { "lang": "en", "time": "2024-04-17T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2024-08-30T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "tagDiv Composer \u003c= 5.0 - Reflected Cross-Site Scripting via envato_code[]" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-3886", "datePublished": "2024-08-31T04:29:19.823Z", "dateReserved": "2024-04-16T16:04:04.969Z", "dateUpdated": "2024-09-03T17:55:29.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-3813
Vulnerability from cvelistv5
Published
2024-06-15 02:01
Modified
2024-08-01 20:20
Severity ?
EPSS score ?
Summary
tagDiv Composer <= 4.8 - Authenticated (Contributor+) Local File Inclusion via Shortcode
References
Impacted products
▼ | Vendor | Product |
---|---|---|
tagDiv | tagDiv Composer |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-3813", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-17T14:00:37.425409Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-17T14:00:44.507Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T20:20:02.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/87b7bc4a-4d2f-4bcb-a9d5-72e31c95c09e?source=cve" }, { "tags": [ "x_transferred" ], "url": "https://tagdiv.com/tagdiv-composer-page-builder-basics/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "tagDiv Composer", "vendor": "tagDiv", "versions": [ { "lessThanOrEqual": "4.8", "status": "affected", "version": "*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Istv\u00e1n M\u00e1rton" } ], "descriptions": [ { "lang": "en", "value": "The tagDiv Composer plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.8 via the \u0027td_block_title\u0027 shortcode \u0027block_template_id\u0027 attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program (\u0027PHP Remote File Inclusion\u0027)", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-15T02:01:59.965Z", "orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "shortName": "Wordfence" }, "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/87b7bc4a-4d2f-4bcb-a9d5-72e31c95c09e?source=cve" }, { "url": "https://tagdiv.com/tagdiv-composer-page-builder-basics/" } ], "timeline": [ { "lang": "en", "time": "2024-04-15T00:00:00.000+00:00", "value": "Discovered" }, { "lang": "en", "time": "2024-04-15T00:00:00.000+00:00", "value": "Vendor Notified" }, { "lang": "en", "time": "2024-04-18T00:00:00.000+00:00", "value": "Disclosed" } ], "title": "tagDiv Composer \u003c= 4.8 - Authenticated (Contributor+) Local File Inclusion via Shortcode" } }, "cveMetadata": { "assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599", "assignerShortName": "Wordfence", "cveId": "CVE-2024-3813", "datePublished": "2024-06-15T02:01:59.965Z", "dateReserved": "2024-04-15T13:17:45.543Z", "dateUpdated": "2024-08-01T20:20:02.285Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3477
Vulnerability from cvelistv5
Published
2022-11-14 00:00
Modified
2025-04-30 19:15
Severity ?
EPSS score ?
Summary
tagDiv Composer < 3.5 - Unauthenticated Account Takeover
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:14:01.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://wpscan.com/vulnerability/993a95d2-6fce-48de-ae17-06ce2db829ef" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-3477", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-30T19:14:51.185195Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-30T19:15:06.272Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tagDiv Composer", "vendor": "tagDiv", "versions": [ { "lessThan": "3.5", "status": "affected", "version": "3.5", "versionType": "custom" } ] }, { "product": "Newspaper", "vendor": "tagDiv", "versions": [ { "lessThan": "12.1", "status": "affected", "version": "12.1", "versionType": "custom" } ] }, { "product": "Newsmag", "vendor": "tagDiv", "versions": [ { "lessThan": "5.2.2", "status": "affected", "version": "5.2.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Truoc Phan" } ], "descriptions": [ { "lang": "en", "value": "The tagDiv Composer WordPress plugin before 3.5, required by the Newspaper WordPress theme before 12.1 and Newsmag WordPress theme before 5.2.2, does not properly implement the Facebook login feature, allowing unauthenticated attackers to login as any user by just knowing their email address" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-14T00:00:00.000Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "url": "https://wpscan.com/vulnerability/993a95d2-6fce-48de-ae17-06ce2db829ef" } ], "source": { "discovery": "EXTERNAL" }, "title": "tagDiv Composer \u003c 3.5 - Unauthenticated Account Takeover", "x_generator": "WPScan CVE Generator" } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-3477", "datePublished": "2022-11-14T00:00:00.000Z", "dateReserved": "2022-10-12T00:00:00.000Z", "dateUpdated": "2025-04-30T19:15:06.272Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }