Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-2407

Publication date:
22/08/2022
The WP phpMyAdmin WordPress plugin before 5.2.0.4 does not escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2022

CVE-2022-2532

Publication date:
22/08/2022
The Feed Them Social WordPress plugin before 3.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
Severity CVSS v4.0: Pending analysis
Last modification:
25/08/2022

CVE-2022-2600

Publication date:
22/08/2022
The Auto-hyperlink URLs WordPress plugin through 5.4.1 does not set rel="noopener noreferer" on generated links, which can lead to Tab Nabbing by giving the target site access to the source tab through the window.opener DOM object.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2593

Publication date:
22/08/2022
The Better Search Replace WordPress plugin before 1.4.1 does not properly sanitise and escape table data before inserting it into a SQL query, which could allow high privilege users to perform SQL Injection attacks
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2544

Publication date:
22/08/2022
The Ninja Job Board WordPress plugin before 1.3.3 does not protect the directory where it stores uploaded resumes, making it vulnerable to unauthenticated Directory Listing which allows the download of uploaded resumes.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2551

Publication date:
22/08/2022
The Duplicator WordPress plugin before 1.4.7 discloses the url of the a backup to unauthenticated visitors accessing the main installer endpoint of the plugin, if the installer script has been run once by an administrator, allowing download of the full site backup without authenticating.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2555

Publication date:
22/08/2022
The Yotpo Reviews for WooCommerce WordPress plugin through 2.0.4 lacks nonce check when updating its settings, which could allow attacker to make a logged in admin change them via a CSRF attack.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2558

Publication date:
22/08/2022
The Simple Job Board WordPress plugin before 2.10.0 is susceptible to Directory Listing which allows the public listing of uploaded resumes in certain configurations.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2557

Publication date:
22/08/2022
The Team WordPress plugin before 4.1.2 contains a file which could allow any authenticated users to download arbitrary files from the server via a path traversal vector. Furthermore, the file will also be deleted after its content is returned to the user
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-2594

Publication date:
22/08/2022
The Advanced Custom Fields WordPress plugin before 5.12.3, Advanced Custom Fields Pro WordPress plugin before 5.12.3 allows unauthenticated users to upload files allowed in a default WP configuration (so PHP is not possible) if there is a frontend form available. This vulnerability was introduced in the 5.0 rewrite and did not exist prior to that release.
Severity CVSS v4.0: Pending analysis
Last modification:
23/08/2022

CVE-2022-33900

Publication date:
22/08/2022
PHP Object Injection vulnerability in Easy Digital Downloads plugin
Severity CVSS v4.0: Pending analysis
Last modification:
20/02/2025

CVE-2022-2276

Publication date:
22/08/2022
The WP Edit Menu WordPress plugin before 1.5.0 does not have authorisation and CSRF in an AJAX action, which could allow unauthenticated attackers to delete arbitrary posts/pages from the blog
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2023