Vulnerabilites related to bestwebsoft - post_to_csv
CVE-2023-36527 (GCVE-0-2023-36527)
Vulnerability from cvelistv5
Published
2023-11-07 16:04
Modified
2024-09-04 19:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1236 - Improper Neutralization of Formula Elements in a CSV File
Summary
Improper Neutralization of Formula Elements in a CSV File vulnerability in BestWebSoft Post to CSV by BestWebSoft.This issue affects Post to CSV by BestWebSoft: from n/a through 1.4.0.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
BestWebSoft | Post to CSV by BestWebSoft |
Version: n/a < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:52:52.385Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "x_transferred" ], "url": "https://patchstack.com/database/vulnerability/post-to-csv/wordpress-post-to-csv-by-bestwebsoft-plugin-1-4-0-csv-injection?_s_id=cve" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-36527", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-04T19:05:28.567587Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-04T19:05:58.474Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://wordpress.org/plugins", "defaultStatus": "unaffected", "packageName": "post-to-csv", "product": "Post to CSV by BestWebSoft", "vendor": "BestWebSoft", "versions": [ { "changes": [ { "at": "1.4.1", "status": "unaffected" } ], "lessThanOrEqual": "1.4.0", "status": "affected", "version": "n/a", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Mika (Patchstack Alliance)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Formula Elements in a CSV File vulnerability in BestWebSoft Post to CSV by BestWebSoft.\u003cp\u003eThis issue affects Post to CSV by BestWebSoft: from n/a through 1.4.0.\u003c/p\u003e" } ], "value": "Improper Neutralization of Formula Elements in a CSV File vulnerability in BestWebSoft Post to CSV by BestWebSoft.This issue affects Post to CSV by BestWebSoft: from n/a through 1.4.0.\n\n" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1236", "description": "CWE-1236 Improper Neutralization of Formula Elements in a CSV File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-07T16:04:27.473Z", "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", "shortName": "Patchstack" }, "references": [ { "tags": [ "vdb-entry" ], "url": "https://patchstack.com/database/vulnerability/post-to-csv/wordpress-post-to-csv-by-bestwebsoft-plugin-1-4-0-csv-injection?_s_id=cve" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to\u0026nbsp;1.4.1 or a higher version." } ], "value": "Update to\u00a01.4.1 or a higher version." } ], "source": { "discovery": "EXTERNAL" }, "title": "WordPress Post to CSV by BestWebSoft Plugin \u003c= 1.4.0 is vulnerable to CSV Injection", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", "assignerShortName": "Patchstack", "cveId": "CVE-2023-36527", "datePublished": "2023-11-07T16:04:27.473Z", "dateReserved": "2023-06-22T14:28:32.642Z", "dateUpdated": "2024-09-04T19:05:58.474Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-3393 (GCVE-0-2022-3393)
Vulnerability from cvelistv5
Published
2022-10-25 00:00
Modified
2025-05-07 13:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1236 - Improper Neutralization of Formula Elements in a CSV File
Summary
The Post to CSV by BestWebSoft WordPress plugin through 1.4.0 does not properly escape fields when exporting data as CSV, leading to a CSV injection
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Unknown | Post to CSV by BestWebSoft |
Version: 1.4.0 < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:07:06.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-3393", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-07T13:55:29.946957Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-07T13:55:53.127Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Post to CSV by BestWebSoft", "vendor": "Unknown", "versions": [ { "lessThanOrEqual": "1.4.0", "status": "affected", "version": "1.4.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Francesco Carlucci" } ], "descriptions": [ { "lang": "en", "value": "The Post to CSV by BestWebSoft WordPress plugin through 1.4.0 does not properly escape fields when exporting data as CSV, leading to a CSV injection" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1236", "description": "CWE-1236 Improper Neutralization of Formula Elements in a CSV File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-25T00:00:00.000Z", "orgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "shortName": "WPScan" }, "references": [ { "url": "https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e" } ], "source": { "discovery": "EXTERNAL" }, "title": "Post to CSV by BestWebSoft \u003c= 1.4.0 - Author+ CSV Injection", "x_generator": "WPScan CVE Generator" } }, "cveMetadata": { "assignerOrgId": "1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81", "assignerShortName": "WPScan", "cveId": "CVE-2022-3393", "datePublished": "2022-10-25T00:00:00.000Z", "dateReserved": "2022-10-03T00:00:00.000Z", "dateUpdated": "2025-05-07T13:55:53.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-2171 (GCVE-0-2017-2171)
Vulnerability from cvelistv5
Published
2017-05-22 16:00
Modified
2024-08-05 13:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-site scripting
Summary
Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF & Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | BestWebSoft | Captcha |
Version: prior to version 4.3.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:48:03.789Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "JVNDB-2017-000094", "tags": [ "third-party-advisory", "x_refsource_JVNDB", "x_transferred" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094" }, { "name": "JVN#24834813", "tags": [ "third-party-advisory", "x_refsource_JVN", "x_transferred" ], "url": "https://jvn.jp/en/jp/JVN24834813/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Captcha", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 4.3.0" } ] }, { "product": "Car Rental", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.5" } ] }, { "product": "Contact Form Multi", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.2.1" } ] }, { "product": "Contact Form", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 4.0.6" } ] }, { "product": "Contact Form to DB", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.5.7" } ] }, { "product": "Custom Admin Page", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 0.1.2" } ] }, { "product": "Custom Fields Search", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.3.2" } ] }, { "product": "Custom Search", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.36" } ] }, { "product": "Donate", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 2.1.1" } ] }, { "product": "Email Queue", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.2" } ] }, { "product": "Error Log Viewer", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.6" } ] }, { "product": "Facebook Button", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 2.54" } ] }, { "product": "Featured Posts", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.1" } ] }, { "product": "Gallery Categories", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.9" } ] }, { "product": "Gallery", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 4.5.0" } ] }, { "product": "Google +1", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.3.4" } ] }, { "product": "Google AdSense", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.44" } ] }, { "product": "Google Analytics", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.7.1" } ] }, { "product": "Google Captcha (reCAPTCHA)", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.28" } ] }, { "product": "Google Maps", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.3.6" } ] }, { "product": "Google Shortlink", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.5.3" } ] }, { "product": "Google Sitemap", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 3.0.8" } ] }, { "product": "Htaccess", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.7.6" } ] }, { "product": "Job Board", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.3" } ] }, { "product": "Latest Posts", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 0.3" } ] }, { "product": "Limit Attempts", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.8" } ] }, { "product": "LinkedIn", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.5" } ] }, { "product": "Multilanguage", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.2.2" } ] }, { "product": "PDF \u0026 Print", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.9.4" } ] }, { "product": "Pagination", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.7" } ] }, { "product": "Pinterest", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.5" } ] }, { "product": "Popular Posts", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.5" } ] }, { "product": "Portfolio", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 2.4" } ] }, { "product": "Post to CSV", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.3.1" } ] }, { "product": "Profile Extra", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.7" } ] }, { "product": "PromoBar", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.1" } ] }, { "product": "Quotes and Tips", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.32" } ] }, { "product": "Re-attacher", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.9" } ] }, { "product": "Realty", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.0" } ] }, { "product": "Relevant - Related Posts", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.2.0" } ] }, { "product": "Sender", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.2.1" } ] }, { "product": "SMTP", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.0" } ] }, { "product": "Social Buttons Pack", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.1.1" } ] }, { "product": "Subscriber", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.3.5" } ] }, { "product": "Testimonials", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 0.1.9" } ] }, { "product": "Timesheet", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 0.1.5" } ] }, { "product": "Twitter Button", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 2.55" } ] }, { "product": "User Role", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.5.6" } ] }, { "product": "Updater", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.35" } ] }, { "product": "Visitors Online", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.0" } ] }, { "product": "Zendesk Help Center", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "prior to version 1.0.5" } ] } ], "datePublic": "2017-05-16T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF \u0026 Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-site scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-05-22T15:57:01", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "name": "JVNDB-2017-000094", "tags": [ "third-party-advisory", "x_refsource_JVNDB" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094" }, { "name": "JVN#24834813", "tags": [ "third-party-advisory", "x_refsource_JVN" ], "url": "https://jvn.jp/en/jp/JVN24834813/index.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vultures@jpcert.or.jp", "ID": "CVE-2017-2171", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Captcha", "version": { "version_data": [ { "version_value": "prior to version 4.3.0" } ] } }, { "product_name": "Car Rental", "version": { "version_data": [ { "version_value": "prior to version 1.0.5" } ] } }, { "product_name": "Contact Form Multi", "version": { "version_data": [ { "version_value": "prior to version 1.2.1" } ] } }, { "product_name": "Contact Form", "version": { "version_data": [ { "version_value": "prior to version 4.0.6" } ] } }, { "product_name": "Contact Form to DB", "version": { "version_data": [ { "version_value": "prior to version 1.5.7" } ] } }, { "product_name": "Custom Admin Page", "version": { "version_data": [ { "version_value": "prior to version 0.1.2" } ] } }, { "product_name": "Custom Fields Search", "version": { "version_data": [ { "version_value": "prior to version 1.3.2" } ] } }, { "product_name": "Custom Search", "version": { "version_data": [ { "version_value": "prior to version 1.36" } ] } }, { "product_name": "Donate", "version": { "version_data": [ { "version_value": "prior to version 2.1.1" } ] } }, { "product_name": "Email Queue", "version": { "version_data": [ { "version_value": "prior to version 1.1.2" } ] } }, { "product_name": "Error Log Viewer", "version": { "version_data": [ { "version_value": "prior to version 1.0.6" } ] } }, { "product_name": "Facebook Button", "version": { "version_data": [ { "version_value": "prior to version 2.54" } ] } }, { "product_name": "Featured Posts", "version": { "version_data": [ { "version_value": "prior to version 1.0.1" } ] } }, { "product_name": "Gallery Categories", "version": { "version_data": [ { "version_value": "prior to version 1.0.9" } ] } }, { "product_name": "Gallery", "version": { "version_data": [ { "version_value": "prior to version 4.5.0" } ] } }, { "product_name": "Google +1", "version": { "version_data": [ { "version_value": "prior to version 1.3.4" } ] } }, { "product_name": "Google AdSense", "version": { "version_data": [ { "version_value": "prior to version 1.44" } ] } }, { "product_name": "Google Analytics", "version": { "version_data": [ { "version_value": "prior to version 1.7.1" } ] } }, { "product_name": "Google Captcha (reCAPTCHA)", "version": { "version_data": [ { "version_value": "prior to version 1.28" } ] } }, { "product_name": "Google Maps", "version": { "version_data": [ { "version_value": "prior to version 1.3.6" } ] } }, { "product_name": "Google Shortlink", "version": { "version_data": [ { "version_value": "prior to version 1.5.3" } ] } }, { "product_name": "Google Sitemap", "version": { "version_data": [ { "version_value": "prior to version 3.0.8" } ] } }, { "product_name": "Htaccess", "version": { "version_data": [ { "version_value": "prior to version 1.7.6" } ] } }, { "product_name": "Job Board", "version": { "version_data": [ { "version_value": "prior to version 1.1.3" } ] } }, { "product_name": "Latest Posts", "version": { "version_data": [ { "version_value": "prior to version 0.3" } ] } }, { "product_name": "Limit Attempts", "version": { "version_data": [ { "version_value": "prior to version 1.1.8" } ] } }, { "product_name": "LinkedIn", "version": { "version_data": [ { "version_value": "prior to version 1.0.5" } ] } }, { "product_name": "Multilanguage", "version": { "version_data": [ { "version_value": "prior to version 1.2.2" } ] } }, { "product_name": "PDF \u0026 Print", "version": { "version_data": [ { "version_value": "prior to version 1.9.4" } ] } }, { "product_name": "Pagination", "version": { "version_data": [ { "version_value": "prior to version 1.0.7" } ] } }, { "product_name": "Pinterest", "version": { "version_data": [ { "version_value": "prior to version 1.0.5" } ] } }, { "product_name": "Popular Posts", "version": { "version_data": [ { "version_value": "prior to version 1.0.5" } ] } }, { "product_name": "Portfolio", "version": { "version_data": [ { "version_value": "prior to version 2.4" } ] } }, { "product_name": "Post to CSV", "version": { "version_data": [ { "version_value": "prior to version 1.3.1" } ] } }, { "product_name": "Profile Extra", "version": { "version_data": [ { "version_value": "prior to version 1.0.7" } ] } }, { "product_name": "PromoBar", "version": { "version_data": [ { "version_value": "prior to version 1.1.1" } ] } }, { "product_name": "Quotes and Tips", "version": { "version_data": [ { "version_value": "prior to version 1.32" } ] } }, { "product_name": "Re-attacher", "version": { "version_data": [ { "version_value": "prior to version 1.0.9" } ] } }, { "product_name": "Realty", "version": { "version_data": [ { "version_value": "prior to version 1.1.0" } ] } }, { "product_name": "Relevant - Related Posts", "version": { "version_data": [ { "version_value": "prior to version 1.2.0" } ] } }, { "product_name": "Sender", "version": { "version_data": [ { "version_value": "prior to version 1.2.1" } ] } }, { "product_name": "SMTP", "version": { "version_data": [ { "version_value": "prior to version 1.1.0" } ] } }, { "product_name": "Social Buttons Pack", "version": { "version_data": [ { "version_value": "prior to version 1.1.1" } ] } }, { "product_name": "Subscriber", "version": { "version_data": [ { "version_value": "prior to version 1.3.5" } ] } }, { "product_name": "Testimonials", "version": { "version_data": [ { "version_value": "prior to version 0.1.9" } ] } }, { "product_name": "Timesheet", "version": { "version_data": [ { "version_value": "prior to version 0.1.5" } ] } }, { "product_name": "Twitter Button", "version": { "version_data": [ { "version_value": "prior to version 2.55" } ] } }, { "product_name": "User Role", "version": { "version_data": [ { "version_value": "prior to version 1.5.6" } ] } }, { "product_name": "Updater", "version": { "version_data": [ { "version_value": "prior to version 1.35" } ] } }, { "product_name": "Visitors Online", "version": { "version_data": [ { "version_value": "prior to version 1.0.0" } ] } }, { "product_name": "Zendesk Help Center", "version": { "version_data": [ { "version_value": "prior to version 1.0.5" } ] } } ] }, "vendor_name": "BestWebSoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF \u0026 Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-site scripting" } ] } ] }, "references": { "reference_data": [ { "name": "JVNDB-2017-000094", "refsource": "JVNDB", "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094" }, { "name": "JVN#24834813", "refsource": "JVN", "url": "https://jvn.jp/en/jp/JVN24834813/index.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2017-2171", "datePublished": "2017-05-22T16:00:00", "dateReserved": "2016-12-01T00:00:00", "dateUpdated": "2024-08-05T13:48:03.789Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-10-25 17:15
Modified
2025-05-07 14:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
The Post to CSV by BestWebSoft WordPress plugin through 1.4.0 does not properly escape fields when exporting data as CSV, leading to a CSV injection
References
▶ | URL | Tags | |
---|---|---|---|
contact@wpscan.com | https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bestwebsoft | post_to_csv | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bestwebsoft:post_to_csv:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "30F4EA90-3059-4A81-8C2E-2D834AF4C48F", "versionEndIncluding": "1.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Post to CSV by BestWebSoft WordPress plugin through 1.4.0 does not properly escape fields when exporting data as CSV, leading to a CSV injection" }, { "lang": "es", "value": "El plugin Post to CSV by BestWebSoft de WordPress versiones hasta 1.4.0, no escapa apropiadamente los campos cuando son exportados los datos como CSV, conllevando a una inyecci\u00f3n CSV" } ], "id": "CVE-2022-3393", "lastModified": "2025-05-07T14:15:32.447", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-10-25T17:15:57.357", "references": [ { "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/689b4c42-c516-4c57-8ec7-3a6f12a3594e" } ], "sourceIdentifier": "contact@wpscan.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1236" } ], "source": "contact@wpscan.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-07 16:15
Modified
2024-11-21 08:09
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Improper Neutralization of Formula Elements in a CSV File vulnerability in BestWebSoft Post to CSV by BestWebSoft.This issue affects Post to CSV by BestWebSoft: from n/a through 1.4.0.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
bestwebsoft | post_to_csv | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bestwebsoft:post_to_csv:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "30F4EA90-3059-4A81-8C2E-2D834AF4C48F", "versionEndIncluding": "1.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Formula Elements in a CSV File vulnerability in BestWebSoft Post to CSV by BestWebSoft.This issue affects Post to CSV by BestWebSoft: from n/a through 1.4.0.\n\n" }, { "lang": "es", "value": "Neutralizaci\u00f3n inadecuada de elementos de f\u00f3rmula en una vulnerabilidad de CSV File en BestWebSoft Post to CSV by BestWebSoft. Este problema afecta a Post to CSV by BestWebSoft: desde n/a hasta 1.4.0." } ], "id": "CVE-2023-36527", "lastModified": "2024-11-21T08:09:52.407", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-11-07T16:15:28.530", "references": [ { "source": "audit@patchstack.com", "tags": [ "Third Party Advisory" ], "url": "https://patchstack.com/database/vulnerability/post-to-csv/wordpress-post-to-csv-by-bestwebsoft-plugin-1-4-0-csv-injection?_s_id=cve" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://patchstack.com/database/vulnerability/post-to-csv/wordpress-post-to-csv-by-bestwebsoft-plugin-1-4-0-csv-injection?_s_id=cve" } ], "sourceIdentifier": "audit@patchstack.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1236" } ], "source": "audit@patchstack.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-05-22 16:29
Modified
2025-04-20 01:37
Severity ?
Summary
Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF & Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu.
References
▶ | URL | Tags | |
---|---|---|---|
vultures@jpcert.or.jp | http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094 | Third Party Advisory, VDB Entry | |
vultures@jpcert.or.jp | https://jvn.jp/en/jp/JVN24834813/index.html | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://jvn.jp/en/jp/JVN24834813/index.html | Third Party Advisory, VDB Entry |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bestwebsoft:captcha:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "90F44502-FB47-4A8C-85E0-1D2F7CEB4F8F", "versionEndIncluding": "4.2.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:car_rental:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7FD9118E-F65C-4F96-A03D-87EF15FE4DB8", "versionEndIncluding": "1.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:contact_form:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "AA683363-7D2C-40FC-AFC1-8BB0D7E3AF60", "versionEndIncluding": "4.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:contact_form_multi:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2C300FBE-4C10-402E-9DFD-9C2A0E241684", "versionEndIncluding": "1.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:contact_form_to_db:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "E74A735C-9771-42FE-91CF-2EE118BE5754", "versionEndIncluding": "1.5.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:custom_admin_page:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "567A9DFD-5848-4A84-8787-CC21DEDF3A20", "versionEndIncluding": "0.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:custom_fields_search:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "A2B55BB7-BAA3-4A64-86B0-D0B1B0AE1790", "versionEndIncluding": "1.3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:custom_search:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "417CA792-0359-484F-873D-CC1B1367EA76", "versionEndIncluding": "1.35", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:donate:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "DFD8E82F-C24A-4038-9B08-CEEF5CBBC42B", "versionEndIncluding": "2.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:email_queue:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "89F8B416-6BFD-48D7-B93E-CAB63DE9186B", "versionEndIncluding": "1.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:error_log_viewer:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2A209B67-5AF3-43B3-882A-EB19FACDF92F", "versionEndIncluding": "1.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:facebook_button:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "654AE23F-C9D4-4C7E-B224-7F3C6928BA26", "versionEndIncluding": "2.53", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:featured_posts:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "988E8170-1CBF-4ADC-996C-AABFB01BA651", "versionEndIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:gallery:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2B96D453-8969-450C-9C65-AB3F7AEEBB4E", "versionEndIncluding": "4.4.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:gallery_categories:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "22A425FD-B64C-4838-B444-E360EC3CC165", "versionEndIncluding": "1.0.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_\\+1:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7254F701-8040-4333-9176-485C933B91C2", "versionEndIncluding": "1.3.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_adsense:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C2E35767-7306-4629-8D52-25473261C6D1", "versionEndIncluding": "1.43", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_analytics:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "8EB86D06-FE0E-4F27-BD0C-DF8F14683C82", "versionEndIncluding": "1.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_captcha_\\(recaptcha\\):*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "41305158-20F3-4981-A225-DA6098D29787", "versionEndIncluding": "1.27", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_maps:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "8D441016-C8FA-46EE-A5C9-1BC59C0300BC", "versionEndIncluding": "1.3.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_shortlink:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "E9D74A48-AA12-4144-9E58-629B0453F2E5", "versionEndIncluding": "1.5.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:google_sitemap:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "76055B18-196C-40E7-9ED0-08757BF02294", "versionEndIncluding": "3.0.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:htaccess:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "9AD12F58-D0AE-4C81-A462-77B773AC6C01", "versionEndIncluding": "1.7.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:job_board:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "1E7291C6-8894-445E-8D1F-F7E0B81B7413", "versionEndIncluding": "1.1.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:latest_posts:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "2E923F7E-6E06-4D71-A6BD-DD3F5C9ACE09", "versionEndIncluding": "0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:limit_attempts:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "4523ADEB-335E-4F85-BB9C-F9067FE7704E", "versionEndIncluding": "1.1.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:linkedin:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7C68F2B6-7703-4D1A-9F65-84AFA2A1399C", "versionEndIncluding": "1.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:multilanguage:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C18F489C-D0D5-4E52-8676-A9AA54E0F4D8", "versionEndIncluding": "1.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:pagination:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "9ACAF0C2-2F33-428A-82C3-033008BA53E5", "versionEndIncluding": "1.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:pdf_\\\u0026_print:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "15CACB57-172A-4D72-945B-2E558C4306A1", "versionEndIncluding": "1.9.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:pinterest:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "128A8B29-44E3-48E2-9B35-647CFDB4B2CF", "versionEndIncluding": "1.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:popular_posts:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "E5142C57-41B0-4C34-8D67-1B0E74E85823", "versionEndIncluding": "1.0.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:portfolio:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "4BB616C1-FB02-4C36-8404-2B51174E0643", "versionEndIncluding": "2.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:post_to_csv:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C7BD7BC4-26C8-44CC-BA11-FBD08C60BDDB", "versionEndIncluding": "1.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:profile_extra:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "A9B6AF6B-7C61-4710-8E20-5260B8BB8587", "versionEndIncluding": "1.0.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:promobar:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "66EBAC9C-9BDF-4CE0-A6DF-F86B60749EBC", "versionEndIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:quotes_and_tips:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "A155BC6E-80DC-4B1F-91BC-91F46EFDB7B0", "versionEndIncluding": "1.31", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:re-attacher:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "D5244EC0-B74E-4621-8A35-1303A66FBB77", "versionEndIncluding": "1.0.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:realty:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7B3D5561-7C8A-4F10-A94C-3B107E859C9F", "versionEndIncluding": "1.0.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:relevant_-_related_posts:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "13C5ADFE-9E5F-4B6D-868C-1E5561BCA735", "versionEndIncluding": "1.1.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:sender:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "E2FEB44F-6295-47DA-A8E1-A98C91D7B3D4", "versionEndIncluding": "1.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:smtp:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "C31637E1-2B26-41D3-9C48-30909192C4C1", "versionEndIncluding": "1.0.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:social_buttons_pack:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "3F00CBC2-5171-47ED-8E4D-B5F5AE6F2D5D", "versionEndIncluding": "1.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:subscriber:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7780A47F-094A-4F9C-AF4E-9C77CDF0ABDE", "versionEndIncluding": "1.3.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:testimonials:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "9936ACD0-1E2E-4E14-B83E-E4967DA9E546", "versionEndIncluding": "0.1.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:timesheet:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "7AF2B2E4-0563-4FB3-83AA-4A219EB41036", "versionEndIncluding": "0.1.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:twitter_button:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "F0CF502E-87F7-4B64-B123-EF610ABAC15D", "versionEndIncluding": "2.54", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:updater:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "1E817AF1-87E3-43A6-86F6-69C585790F47", "versionEndIncluding": "1.34", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:user_role:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "97AD540F-5775-4F84-AAA5-175C947BB34E", "versionEndIncluding": "1.5.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:visitors_online:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "61A05396-59CD-475A-A4D5-009B591C6BA4", "versionEndIncluding": "0.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bestwebsoft:zendesk_help_center:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "6F4D196B-0578-44BA-A2C3-10F1C4D395F8", "versionEndIncluding": "1.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting vulnerability in Captcha prior to version 4.3.0, Car Rental prior to version 1.0.5, Contact Form Multi prior to version 1.2.1, Contact Form prior to version 4.0.6, Contact Form to DB prior to version 1.5.7, Custom Admin Page prior to version 0.1.2, Custom Fields Search prior to version 1.3.2, Custom Search prior to version 1.36, Donate prior to version 2.1.1, Email Queue prior to version 1.1.2, Error Log Viewer prior to version 1.0.6, Facebook Button prior to version 2.54, Featured Posts prior to version 1.0.1, Gallery Categories prior to version 1.0.9, Gallery prior to version 4.5.0, Google +1 prior to version 1.3.4, Google AdSense prior to version 1.44, Google Analytics prior to version 1.7.1, Google Captcha (reCAPTCHA) prior to version 1.28, Google Maps prior to version 1.3.6, Google Shortlink prior to version 1.5.3, Google Sitemap prior to version 3.0.8, Htaccess prior to version 1.7.6, Job Board prior to version 1.1.3, Latest Posts prior to version 0.3, Limit Attempts prior to version 1.1.8, LinkedIn prior to version 1.0.5, Multilanguage prior to version 1.2.2, PDF \u0026 Print prior to version 1.9.4, Pagination prior to version 1.0.7, Pinterest prior to version 1.0.5, Popular Posts prior to version 1.0.5, Portfolio prior to version 2.4, Post to CSV prior to version 1.3.1, Profile Extra prior to version 1.0.7. PromoBar prior to version 1.1.1, Quotes and Tips prior to version 1.32, Re-attacher prior to version 1.0.9, Realty prior to version 1.1.0, Relevant - Related Posts prior to version 1.2.0, Sender prior to version 1.2.1, SMTP prior to version 1.1.0, Social Buttons Pack prior to version 1.1.1, Subscriber prior to version 1.3.5, Testimonials prior to version 0.1.9, Timesheet prior to version 0.1.5, Twitter Button prior to version 2.55, User Role prior to version 1.5.6, Updater prior to version 1.35, Visitors Online prior to version 1.0.0, and Zendesk Help Center prior to version 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the function to display the BestWebSoft menu." }, { "lang": "es", "value": "Una Vulnerabilidad de tipo cross-site-scripting en Captcha anterior a versi\u00f3n 4.3.0, Car Rental anterior a versi\u00f3n 1.0.5, Contact Form Multi anterior a versi\u00f3n 1.2.1, Contact Form anterior a versi\u00f3n 4.0.6, Contact Form to DB anterior a versi\u00f3n 1.5.7, Custom Admin Page anterior a versi\u00f3n 0.1.2, Custom Fields Search anterior a versi\u00f3n 1.3.2, Custom Search anterior a versi\u00f3n 1.36, Donate anterior a versi\u00f3n 2.1.1, Email Queue anterior a versi\u00f3n 1.1.2, Error Log Viewer anterior a versi\u00f3n 1.0.6, Facebook Button anterior a versi\u00f3n 2.54, Featured Posts anterior a versi\u00f3n 1.0.1, Gallery Categories anterior a versi\u00f3n 1.0.9, Gallery anterior a versi\u00f3n 4.5.0, Google +1 anterior a versi\u00f3n 1.3.4, Google AdSense anterior a versi\u00f3n 1.44, Google Analytics anterior a versi\u00f3n 1.7.1, Google Captcha (reCAPTCHA) anterior a versi\u00f3n 1.28, Google Maps anterior a versi\u00f3n 1.3.6, Google Shortlink anterior a versi\u00f3n 1.5.3, Google Sitemap anterior a versi\u00f3n 3.0.8, Htaccess anterior a versi\u00f3n 1.7.6, Job Board anterior a versi\u00f3n 1.1.3, Latest Posts anterior a versi\u00f3n 0.3, Limit Attempts anterior a versi\u00f3n 1.1.8, LinkedIn anterior a versi\u00f3n 1.0.5, Multilanguage anterior a versi\u00f3n 1.2.2, PDF \u0026 Print anterior a versi\u00f3n 1.9.4, Pagination anterior a versi\u00f3n 1.0.7, Pinterest anterior a versi\u00f3n 1.0.5, Popular Posts anteriores a versi\u00f3n 1.0.5, Portfolio anterior a la versi\u00f3n 2.4, Post to CSV anterior a versi\u00f3n 1.3.1, Profile Extra anterior a versi\u00f3n 1.0.7. PromoBar anterior a versi\u00f3n 1.1.1, Quotes and Tips anterior a versi\u00f3n 1.32, Re-attacher anterior a versi\u00f3n 1.0.9, Realty anterior a versi\u00f3n 1.1.0, Relevant - Related Posts anterior a versi\u00f3n 1.2.0, Sender anterior a versi\u00f3n 1.2.1, SMTP anterior a versi\u00f3n 1.1.0, Social Buttons Pack anterior a versi\u00f3n 1.1.1, Subscriber anterior a versi\u00f3n 1.3.5, Testimonials anteriores a versi\u00f3n 0.1.9, Timesheet anterior a versi\u00f3n 0.1.5, Twitter Button anterior a versi\u00f3n 2.55, User Role anterior a versi\u00f3n 1.5.6, Updater anterior a versi\u00f3n 1.35, Visitors Online anterior a versi\u00f3n 1.0.0, y Zendesk Help Center anterior a versi\u00f3n 1.0.5, permite a los atacantes remotos inyectar script web o HTML arbitrario por medio de la funci\u00f3n para mostrar el men\u00fa BestWebSoft." } ], "id": "CVE-2017-2171", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-22T16:29:00.747", "references": [ { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094" }, { "source": "vultures@jpcert.or.jp", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/jp/JVN24834813/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2017-000094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://jvn.jp/en/jp/JVN24834813/index.html" } ], "sourceIdentifier": "vultures@jpcert.or.jp", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" }, { "lang": "en", "value": "CWE-91" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }