Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-24169

Publication date:
05/04/2021
This Advanced Order Export For WooCommerce WordPress plugin before 3.1.8 helps you to easily export WooCommerce order data. The tab parameter in the Admin Panel is vulnerable to reflected XSS.
Severity CVSS v4.0: Pending analysis
Last modification:
20/11/2024

CVE-2021-24163

Publication date:
05/04/2021
The AJAX action, wp_ajax_ninja_forms_sendwp_remote_install_handler, did not have a capability check on it, nor did it have any nonce protection, therefore making it possible for low-level users, such as subscribers, to install and activate the SendWP Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 and retrieve the client_secret key needed to establish the SendWP connection while also installing the SendWP plugin.
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-24164

Publication date:
05/04/2021
In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the client_id for an already established OAuth connection.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2022

CVE-2021-24157

Publication date:
05/04/2021
Orbit Fox by ThemeIsle has a feature to add custom scripts to the header and footer of a page or post. There were no checks to verify that a user had the unfiltered_html capability prior to saving the script tags, thus allowing lower-level users to inject scripts that could potentially be malicious.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2021

CVE-2021-24152

Publication date:
05/04/2021
The "All Subscribers" setting page of Popup Builder was vulnerable to reflected Cross-Site Scripting.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2021

CVE-2021-24156

Publication date:
05/04/2021
Stored Cross-Site Scripting vulnerabilities in Testimonial Rotator 3.0.3 allow low privileged users (Contributor) to inject arbitrary JavaScript code or HTML without approval. This could lead to privilege escalation
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2021

CVE-2021-24154

Publication date:
05/04/2021
The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd
Severity CVSS v4.0: Pending analysis
Last modification:
19/04/2021

CVE-2021-24150

Publication date:
05/04/2021
The LikeBtn WordPress Like Button Rating ♥ LikeBtn WordPress plugin before 2.6.32 was vulnerable to Unauthenticated Full-Read Server-Side Request Forgery (SSRF).
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2021-24153

Publication date:
05/04/2021
A Stored Cross-Site Scripting vulnerability was discovered in the Yoast SEO WordPress plugin before 3.4.1, which had built-in blacklist filters which were blacklisting Parenthesis as well as several functions such as alert but bypasses were found.
Severity CVSS v4.0: Pending analysis
Last modification:
09/04/2021

CVE-2021-24155

Publication date:
05/04/2021
The WordPress Backup and Migrate Plugin – Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2021

CVE-2021-24158

Publication date:
05/04/2021
Orbit Fox by ThemeIsle has a feature to add a registration form to both the Elementor and Beaver Builder page builders functionality. As part of the registration form, administrators can choose which role to set as the default for users upon registration. This field is hidden from view for lower-level users, however, they can still supply the user_role parameter to update the default role for registration.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2022

CVE-2020-4997

Publication date:
05/04/2021
IBM InfoSphere Information Server 11.7 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192914
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2021