Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-4312

Publication date:
12/12/2022
<br /> A cleartext storage of sensitive information vulnerability exists in PcVue versions 8.10 through 15.2.3. This could<br /> allow an unauthorized user with access the email and short messaging service (SMS) accounts configuration files<br /> to discover the associated simple mail transfer protocol (SMTP) account credentials and the SIM card PIN code.<br /> Successful exploitation of this vulnerability could allow an unauthorized user access to the underlying email<br /> account and SIM card.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
07/11/2023

CVE-2022-3930

Publication date:
12/12/2022
The Directorist WordPress plugin before 7.4.2.2 suffers from an IDOR vulnerability which an attacker can exploit to change the password of arbitrary users instead of his own.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-3925

Publication date:
12/12/2022
The buddybadges WordPress plugin through 1.0.0 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-3946

Publication date:
12/12/2022
The Welcart e-Commerce WordPress plugin before 2.8.4 does not have authorisation and CSRF in an AJAX action, allowing any logged-in user to create, update and delete shipping methods.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-4000

Publication date:
12/12/2022
The WooCommerce Shipping WordPress plugin through 1.2.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-3981

Publication date:
12/12/2022
The Icegram Express WordPress plugin before 5.5.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by any authenticated users, such as subscriber
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-3982

Publication date:
12/12/2022
The Booking calendar, Appointment Booking System WordPress plugin before 3.2.2 does not validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-4004

Publication date:
12/12/2022
The Donation Button WordPress plugin through 4.0.0 does not properly check for privileges and nonce tokens in its "donation_button_twilio_send_test_sms" AJAX action, which may allow any users with an account on the affected site, like subscribers, to use the plugin&amp;#39;s Twilio integration to send SMSes to arbitrary phone numbers.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-3935

Publication date:
12/12/2022
The Welcart e-Commerce WordPress plugin before 2.8.4 does not sanitise and escape some parameters, which could allow any authenticated users, such as subscriber to perform Stored Cross-Site Scripting attacks
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-3933

Publication date:
12/12/2022
The Essential Real Estate WordPress plugin before 3.9.6 does not sanitize and escapes some parameters, which could allow users with a role as low as Admin to perform Cross-Site Scripting attacks.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-3989

Publication date:
12/12/2022
The Motors WordPress plugin before 1.4.4 does not properly validate uploaded files for dangerous file types (such as .php) in an AJAX action, allowing an attacker to sign up on a victim&amp;#39;s WordPress instance, upload a malicious PHP file and attempt to launch a brute-force attack to discover the uploaded payload.
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025

CVE-2022-3934

Publication date:
12/12/2022
The FlatPM WordPress plugin before 3.0.13 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Severity CVSS v4.0: Pending analysis
Last modification:
22/04/2025