A vulnerability, which was classified as problematic, has been found in Booking X Plugin up to 1.1.2 on WordPress. Affected by this issue is the function export_now of the component HTTP POST Request Handler. The manipulation leads to missing authorization.
This vulnerability is handled as CVE-2025-6814. The attack may be launched remotely. There is no exploit available.
A vulnerability has been found in GoZen Forms Plugin up to 1.1.5 on WordPress and classified as critical. This vulnerability affects the function emdedSc. The manipulation of the argument ID leads to sql injection.
This vulnerability was named CVE-2025-6783. The attack can be initiated remotely. There is no exploit available.
A vulnerability was found in GoZen Forms Plugin up to 1.1.5 on WordPress and classified as critical. This issue affects the function dirGZActiveForm. The manipulation of the argument forms-id leads to sql injection.
The identification of this vulnerability is CVE-2025-6782. The attack may be initiated remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Smart Docs Plugin up to 1.1.0 on WordPress. This affects the function smartdocs_search of the component Shortcode Handler. The manipulation leads to cross site scripting.
This vulnerability is uniquely identified as CVE-2025-6787. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Cockpit up to 2.11.3. It has been rated as problematic. This issue affects some unknown processing of the file /system/users/save. The manipulation of the argument name/email leads to cross site scripting.
The identification of this vulnerability is CVE-2025-7053. The attack may be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
The vendor was contacted early about this disclosure and acted very professional. A patch and new release was made available very quickly.
A vulnerability classified as critical was found in WP Human Resource Management Plugin up to 2.2.17 on WordPress. Affected by this vulnerability is the function ajax_insert_employee of the component AJAX Handler. The manipulation of the argument role leads to missing authorization.
This vulnerability is known as CVE-2025-5953. The attack can be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in WP Firebase Push Notification Plugin up to 1.2.0 on WordPress. This issue affects the function wfpn_brodcast_notification_message. The manipulation leads to cross-site request forgery.
The identification of this vulnerability is CVE-2025-5924. The attack may be initiated remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in ProcessingJS Plugin up to 1.2.2 on WordPress. Affected is the function pjs4wp. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-6039. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in WP Shortcodes Plugin Plugin up to 7.4.0 on WordPress. It has been classified as problematic. Affected is an unknown function. The manipulation of the argument data-url leads to cross site scripting.
This vulnerability is traded as CVE-2025-5567. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability, which was classified as critical, was found in e4jvikwp VikRentCar Car Rental Management System Plugin up to 1.4.3 on WordPress. This affects the function do_updatecar. The manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2025-5322. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, was found in MintyDocs Extension up to 1.39.x/1.42.x/1.43.1 on Mediawiki. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2025-53493. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.