Vulnerabilities (CVE)

Filtered by CWE-862
Total 5093 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-48926 1 Prestashop 1 Advanced Loyalty Program 2025-06-02 N/A 5.3 MEDIUM
An issue in 202 ecommerce Advanced Loyalty Program: Loyalty Points before v2.3.4 for PrestaShop allows unauthenticated attackers to arbitrarily change an order status.
CVE-2024-45689 1 Moodle 1 Moodle 2025-06-02 N/A 6.5 MEDIUM
A flaw was found in Moodle. Dynamic tables did not enforce capability checks, which resulted in users having the ability to retrieve information they did not have permission to access.
CVE-2024-0238 1 Myeventon 1 Eventon 2025-06-02 N/A 6.1 MEDIUM
The EventON Premium WordPress plugin before 4.5.6, EventON WordPress plugin before 2.2.8 do not have authorisation in an AJAX action, and does not ensure that the post to be updated belong to the plugin, allowing unauthenticated users to update arbitrary post metadata.
CVE-2024-0237 1 Myeventon 1 Eventon 2025-06-02 N/A 5.3 MEDIUM
The EventON WordPress plugin through 4.5.8, EventON WordPress plugin before 2.2.7 do not have authorisation in some AJAX actions, allowing unauthenticated users to update virtual events settings, such as meeting URL, moderator, access details etc
CVE-2025-46823 2025-05-30 N/A N/A
openmrs-module-fhir2 provides the FHIR REST API and related services for OpenMRS, an open medical records system. In versions of the FHIR2 module prior to 2.5.0, privileges were not always correctly checked, which means that unauthorized users may have been able to add or edit data they were not supposed to be able to. All implementers should update to FHIR2 2.5.0 or newer as soon as is feasible to receive a patch.
CVE-2025-4597 2025-05-30 N/A 6.5 MEDIUM
The Woo Slider Pro – Drag Drop Slider Builder For WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the woo_slide_pro_delete_draft_preview AJAX action in all versions up to, and including, 1.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary posts.
CVE-2023-43846 1 Aten 2 Pe6208, Pe6208 Firmware 2025-05-30 N/A 5.3 MEDIUM
Incorrect access control in logs management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote attackers to get the device logs via HTTP GET request. The logs contain such information as user names and IP addresses used in the infrastructure. This information may help the attackers to conduct further attacks in the infrastructure.
CVE-2018-10207 1 Vaultize 1 Enterprise File Sharing 2025-05-30 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Vaultize Enterprise File Sharing 17.05.31. An attacker can exploit Missing Authorization on the FlexPaperViewer SWF reader, and export files that should have been restricted, via vectors involving page-by-page access to a document in SWF format.
CVE-2025-48138 1 Bertha 1 Bertha Ai 2025-05-30 N/A 4.3 MEDIUM
Missing Authorization vulnerability in berthaai BERTHA AI allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects BERTHA AI: from n/a through 1.12.11.
CVE-2024-23752 1 Gabrieleventuri 1 Pandasai 2025-05-30 N/A 9.8 CRITICAL
GenerateSDFPipeline in synthetic_dataframe in PandasAI (aka pandas-ai) through 1.5.17 allows attackers to trigger the generation of arbitrary Python code that is executed by SDFCodeExecutor. An attacker can create a dataframe that provides an English language specification of this Python code. NOTE: the vendor previously attempted to restrict code execution in response to a separate issue, CVE-2023-39660.
CVE-2024-0679 1 Themegrill 1 Colormag 2025-05-30 N/A 6.5 MEDIUM
The ColorMag theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the plugin_action_callback() function in all versions up to, and including, 3.1.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to install and activate arbitrary plugins.
CVE-2023-48324 1 Getawesomesupport 1 Awesome Support 2025-05-29 N/A 5.4 MEDIUM
Missing Authorization vulnerability in Awesome Support Team Awesome Support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Awesome Support: from n/a through 6.1.4.
CVE-2023-49757 1 Getawesomesupport 1 Awesome Support 2025-05-29 N/A 5.4 MEDIUM
Missing Authorization vulnerability in Awesome Support Team Awesome Support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Awesome Support: from n/a through 6.1.10.
CVE-2023-49857 1 Getawesomesupport 1 Awesome Support 2025-05-29 N/A 6.5 MEDIUM
Missing Authorization vulnerability in Awesome Support Team Awesome Support allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Awesome Support: from n/a through 6.1.7.
CVE-2023-45760 1 Gvectors 1 Wpdiscuz 2025-05-29 N/A 4.3 MEDIUM
Missing Authorization vulnerability in gVectors Team wpDiscuz allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects wpDiscuz: from n/a through 7.6.3.
CVE-2024-32715 1 Olivethemes 1 Olive One Click Demo Import 2025-05-29 N/A 5.3 MEDIUM
Missing Authorization vulnerability in Olive Themes Olive One Click Demo Import.This issue affects Olive One Click Demo Import: from n/a through 1.1.1.
CVE-2023-46309 1 Gvectors 1 Wpdiscuz 2025-05-29 N/A 5.3 MEDIUM
Missing Authorization vulnerability in gVectors Team wpDiscuz allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects wpDiscuz: from n/a through 7.6.10.
CVE-2022-41238 1 Jenkins 1 Dotci 2025-05-29 N/A 9.8 CRITICAL
A missing permission check in Jenkins DotCi Plugin 2.40.00 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specified repository for attacker-specified commits.
CVE-2024-32792 1 Incsub 1 Hummingbird 2025-05-29 N/A 4.3 MEDIUM
Missing Authorization vulnerability in WPMU DEV Hummingbird.This issue affects Hummingbird: from n/a through 3.7.3.
CVE-2024-8437 1 Plugingarden 1 Wp Easy Gallery 2025-05-29 N/A 4.3 MEDIUM
The WP Easy Gallery – WordPress Gallery Plugin plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions hooked via AJAX like wpeg_settings and wpeg_add_gallery in all versions up to, and including, 4.8.5. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify galleries.