The Ad Inserter for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.7.30 via the ai-debug-processing-fe URL parameter. This can allow unauthenticated attackers to extract sensitive data including installed plugins (present and active), active theme, various plugin settings, WordPress version, as well as some server settings such as memory limit, installation paths.
Max CVSS
7.5
EPSS Score
0.09%
Published
2023-10-20
Updated
2023-10-27
The Ad Inserter WordPress plugin before 2.7.27 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present
Max CVSS
7.2
EPSS Score
0.05%
Published
2023-05-15
Updated
2023-05-23
The Ad Inserter Free and Pro WordPress plugins before 2.7.12 do not sanitise and escape the REQUEST_URI before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting in browsers which do not encode characters
Max CVSS
6.1
EPSS Score
0.15%
Published
2022-04-04
Updated
2022-04-11
The Ad Inserter WordPress plugin before 2.7.10, Ad Inserter Pro WordPress plugin before 2.7.10 do not sanitise and escape the html_element_selection parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
Max CVSS
6.1
EPSS Score
0.11%
Published
2022-02-21
Updated
2022-02-28
The ad-inserter plugin before 2.4.22 for WordPress has remote code execution.
Max CVSS
8.8
EPSS Score
0.78%
Published
2019-08-22
Updated
2019-08-26
The ad-inserter plugin before 2.4.20 for WordPress has path traversal.
Max CVSS
7.5
EPSS Score
0.18%
Published
2019-08-22
Updated
2023-02-24
The ad-inserter plugin before 1.5.3 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=ad-inserter.php.
Max CVSS
8.8
EPSS Score
0.43%
Published
2019-10-22
Updated
2019-10-23
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!