Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-2600

Publication date:
22/08/2022
The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not set rel="noopener noreferer" on generated links, which can lead to Tab Nabbing by giving the target site access to the source tab through the window.opener DOM object.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2593

Publication date:
22/08/2022
The Better Search Replace WordPress plugin before 1.4.1 does not properly sanitise and escape table data before inserting it into a SQL query, which could allow high privilege users to perform SQL Injection attacks
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2544

Publication date:
22/08/2022
The Ninja Job Board WordPress plugin before 1.3.3 does not protect the directory where it stores uploaded resumes, making it vulnerable to unauthenticated Directory Listing which allows the download of uploaded resumes.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2555

Publication date:
22/08/2022
The Yotpo Reviews for WooCommerce WordPress plugin through 2.0.4 lacks nonce check when updating its settings, which could allow attacker to make a logged in admin change them via a CSRF attack.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2558

Publication date:
22/08/2022
The Simple Job Board WordPress plugin before 2.10.0 is susceptible to Directory Listing which allows the public listing of uploaded resumes in certain configurations.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2557

Publication date:
22/08/2022
The Team WordPress plugin before 4.1.2 contains a file which could allow any authenticated users to download arbitrary files from the server via a path traversal vector. Furthermore, the file will also be deleted after its content is returned to the user
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2594

Publication date:
22/08/2022
The Advanced Custom Fields WordPress plugin before 5.12.3, Advanced Custom Fields Pro WordPress plugin before 5.12.3 allows unauthenticated users to upload files allowed in a default WP configuration (so PHP is not possible) if there is a frontend form available. This vulnerability was introduced in the 5.0 rewrite and did not exist prior to that release.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2551

Publication date:
22/08/2022
The Duplicator WordPress plugin before 1.4.7 discloses the url of the a backup to unauthenticated visitors accessing the main installer endpoint of the plugin, if the installer script has been run once by an administrator, allowing download of the full site backup without authenticating.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2026

CVE-2022-2552

Publication date:
22/08/2022
The Duplicator WordPress plugin before 1.4.7 does not authenticate or authorize visitors before displaying information about the system such as server software, php version and full file system path to the site.
Severity CVSS v4.0: Pending analysis
Last modification:
02/02/2026

CVE-2022-25810

Publication date:
22/08/2022
The Transposh WordPress Translation WordPress plugin through 1.0.8 exposes a couple of sensitive actions such has “tp_reset” under the Utilities tab (/wp-admin/admin.php?page=tp_utils), which can be used/executed as the lowest-privileged user. Basically all Utilities functionalities are vulnerable this way, which involves resetting configurations and backup/restore operations.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-25811

Publication date:
22/08/2022
The Transposh WordPress Translation WordPress plugin through 1.0.8 does not sanitise and escape the order and orderby parameters before using them in a SQL statement, leading to a SQL injection
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2022

CVE-2022-25812

Publication date:
22/08/2022
The Transposh WordPress Translation WordPress plugin before 1.0.8 does not validate its debug settings, which could allow allowing high privilege users such as admin to perform RCE
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2022