All the vulnerabilites related to Unknown - Workreap
cve-2022-4239
Vulnerability from cvelistv5
Published
2022-12-26 12:28
Modified
2024-08-03 01:34
Severity ?
EPSS score ?
Summary
Workreap < 2.6.4 - Subscriber+ Arbitrary Posts Deletion via IDOR
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/1c163987-fb53-43f7-bbff-1c2d8c0d694c | exploit, vdb-entry, technical-description |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:34:49.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description", "x_transferred" ], "url": "https://wpscan.com/vulnerability/1c163987-fb53-43f7-bbff-1c2d8c0d694c" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Workreap", "vendor": "Unknown", "versions": [ { "lessThan": "2.6.4", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Veshraj Ghimire" }, { "lang": "en", "type": "coordinator", "value": "WPScan" } ], "descriptions": [ { "lang": "en", "value": "The Workreap WordPress theme before 2.6.4 does not verify that an addon service belongs to the user issuing the request, or indeed that it is an addon service, when processing the workreap_addons_service_remove action, allowing any user to delete any post by knowing or guessing the id." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-639 Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-10T09:10:40.720Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/1c163987-fb53-43f7-bbff-1c2d8c0d694c" } ], "source": { "discovery": "EXTERNAL" }, "title": "Workreap \u003c 2.6.4 - Subscriber+ Arbitrary Posts Deletion via IDOR", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-4239", "datePublished": "2022-12-26T12:28:20.678Z", "dateReserved": "2022-11-30T19:00:06.582Z", "dateUpdated": "2024-08-03T01:34:49.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-24501
Vulnerability from cvelistv5
Published
2021-08-09 10:04
Modified
2024-08-03 19:35
Severity ?
EPSS score ?
Summary
Workreap theme < 2.2.2 - Missing Authorization Checks in Ajax Actions
References
▼ | URL | Tags |
---|---|---|
https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/ | x_refsource_MISC | |
https://wpscan.com/vulnerability/66e4aaf4-5ef7-4da8-a45c-e24f449c363e | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:35:19.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/66e4aaf4-5ef7-4da8-a45c-e24f449c363e" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workreap", "vendor": "Unknown", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "2.2.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Harald Eilertsen (Jetpack)" } ], "descriptions": [ { "lang": "en", "value": "The Workreap WordPress theme before 2.2.2 had several AJAX actions missing authorization checks to verify that a user was authorized to perform critical operations such as modifying or deleting objects. This allowed a logged in user to modify or delete objects belonging to other users on the site." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-283", "description": "CWE-283 Unverified Ownership", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-09T10:04:09", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/66e4aaf4-5ef7-4da8-a45c-e24f449c363e" } ], "source": { "discovery": "UNKNOWN" }, "title": "Workreap theme \u003c 2.2.2 - Missing Authorization Checks in Ajax Actions", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24501", "STATE": "PUBLIC", "TITLE": "Workreap theme \u003c 2.2.2 - Missing Authorization Checks in Ajax Actions" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workreap", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.2.2", "version_value": "2.2.2" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Harald Eilertsen (Jetpack)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Workreap WordPress theme before 2.2.2 had several AJAX actions missing authorization checks to verify that a user was authorized to perform critical operations such as modifying or deleting objects. This allowed a logged in user to modify or delete objects belonging to other users on the site." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-283 Unverified Ownership" } ] }, { "description": [ { "lang": "eng", "value": "CWE-862 Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/", "refsource": "MISC", "url": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/" }, { "name": "https://wpscan.com/vulnerability/66e4aaf4-5ef7-4da8-a45c-e24f449c363e", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/66e4aaf4-5ef7-4da8-a45c-e24f449c363e" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24501", "datePublished": "2021-08-09T10:04:09", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:35:19.963Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-24500
Vulnerability from cvelistv5
Published
2021-08-09 10:04
Modified
2024-08-03 19:35
Severity ?
EPSS score ?
Summary
Workreap theme < 2.2.2 - Multiple CSRF + IDOR Vulnerabilities
References
▼ | URL | Tags |
---|---|---|
https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/ | x_refsource_MISC | |
https://wpscan.com/vulnerability/0c4b5ecc-54d0-45ec-9f92-b2ca3cadbe56 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:35:19.928Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wpscan.com/vulnerability/0c4b5ecc-54d0-45ec-9f92-b2ca3cadbe56" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workreap", "vendor": "Unknown", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "2.2.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Harald Eilertsen (Jetpack)" } ], "descriptions": [ { "lang": "en", "value": "Several AJAX actions available in the Workreap WordPress theme before 2.2.2 lacked CSRF protections, as well as allowing insecure direct object references that were not validated. This allows an attacker to trick a logged in user to submit a POST request to the vulnerable site, potentially modifying or deleting arbitrary objects on the target site." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-283", "description": "CWE-283 Unverified Ownership", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862 Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-09T10:04:08", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://wpscan.com/vulnerability/0c4b5ecc-54d0-45ec-9f92-b2ca3cadbe56" } ], "source": { "discovery": "UNKNOWN" }, "title": "Workreap theme \u003c 2.2.2 - Multiple CSRF + IDOR Vulnerabilities", "x_generator": "WPScan CVE Generator", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "contact@wpscan.com", "ID": "CVE-2021-24500", "STATE": "PUBLIC", "TITLE": "Workreap theme \u003c 2.2.2 - Multiple CSRF + IDOR Vulnerabilities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Workreap", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "2.2.2", "version_value": "2.2.2" } ] } } ] }, "vendor_name": "Unknown" } ] } }, "credit": [ { "lang": "eng", "value": "Harald Eilertsen (Jetpack)" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Several AJAX actions available in the Workreap WordPress theme before 2.2.2 lacked CSRF protections, as well as allowing insecure direct object references that were not validated. This allows an attacker to trick a logged in user to submit a POST request to the vulnerable site, potentially modifying or deleting arbitrary objects on the target site." } ] }, "generator": "WPScan CVE Generator", "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-283 Unverified Ownership" } ] }, { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] }, { "description": [ { "lang": "eng", "value": "CWE-862 Missing Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/", "refsource": "MISC", "url": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/" }, { "name": "https://wpscan.com/vulnerability/0c4b5ecc-54d0-45ec-9f92-b2ca3cadbe56", "refsource": "MISC", "url": "https://wpscan.com/vulnerability/0c4b5ecc-54d0-45ec-9f92-b2ca3cadbe56" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24500", "datePublished": "2021-08-09T10:04:08", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:35:19.928Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-24499
Vulnerability from cvelistv5
Published
2021-08-09 00:00
Modified
2024-08-03 19:35
Severity ?
EPSS score ?
Summary
Workreap theme < 2.2.2 - Unauthenticated Upload Leading to Remote Code Execution
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:35:19.868Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://wpscan.com/vulnerability/74611d5f-afba-42ae-bc19-777cdf2808cb" }, { "tags": [ "x_transferred" ], "url": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/172876/WordPress-Workreap-2.2.2-Shell-Upload.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Workreap", "vendor": "Unknown", "versions": [ { "lessThan": "2.2.2", "status": "affected", "version": "2.2.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Harald Eilertsen (Jetpack)" } ], "descriptions": [ { "lang": "en", "value": "The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-12T00:00:00", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "url": "https://wpscan.com/vulnerability/74611d5f-afba-42ae-bc19-777cdf2808cb" }, { "url": "https://jetpack.com/2021/07/07/multiple-vulnerabilities-in-workreap-theme/" }, { "url": "http://packetstormsecurity.com/files/172876/WordPress-Workreap-2.2.2-Shell-Upload.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Workreap theme \u003c 2.2.2 - Unauthenticated Upload Leading to Remote Code Execution", "x_generator": "WPScan CVE Generator" } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2021-24499", "datePublished": "2021-08-09T00:00:00", "dateReserved": "2021-01-14T00:00:00", "dateUpdated": "2024-08-03T19:35:19.868Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3846
Vulnerability from cvelistv5
Published
2022-12-05 16:51
Modified
2024-08-03 01:20
Severity ?
EPSS score ?
Summary
Workreap - Freelance Marketplace and Directory < 2.6.3 - Subscriber+ Private Message Disclosure via IDOR
References
▼ | URL | Tags |
---|---|---|
https://wpscan.com/vulnerability/6220c7ef-69a6-49c4-9c56-156b945446af | exploit, vdb-entry, technical-description |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:20:58.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description", "x_transferred" ], "url": "https://wpscan.com/vulnerability/6220c7ef-69a6-49c4-9c56-156b945446af" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Workreap", "vendor": "Unknown", "versions": [ { "lessThan": "2.6.3", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Veshraj Ghimire" } ], "descriptions": [ { "lang": "en", "value": "The Workreap WordPress theme before 2.6.3 has a vulnerability with the notifications feature as it\u0027s possible to read any user\u0027s notification (employer or freelancer) as the notification ID is brute-forceable." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-639 Authorization Bypass Through User-Controlled Key", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-05T16:51:48.844Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "tags": [ "exploit", "vdb-entry", "technical-description" ], "url": "https://wpscan.com/vulnerability/6220c7ef-69a6-49c4-9c56-156b945446af" } ], "source": { "discovery": "EXTERNAL" }, "title": "Workreap - Freelance Marketplace and Directory \u003c 2.6.3 - Subscriber+ Private Message Disclosure via IDOR", "x_generator": { "engine": "WPScan CVE Generator" } } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-3846", "datePublished": "2022-12-05T16:51:48.844Z", "dateReserved": "2022-11-03T01:34:33.367Z", "dateUpdated": "2024-08-03T01:20:58.635Z", "requesterUserId": "dc9e157c-ddf1-4983-adaf-9f01d16b5e04", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }