The Duplicate Page or Post WordPress plugin before 1.5.1 does not have any authorisation and has a flawed CSRF check in the wpdevart_duplicate_post_parametrs_save_in_db AJAX action, allowing any authenticated users, such as subscriber to call it and change the plugin’s settings, or perform such attack via CSRF. Furthermore, due to the lack of escaping, this could lead to Stored Cross-Site Scripting issues
More Stories
golang-github-openprinting-ipp-usb-0.9.30-1.fc41
FEDORA-2025-73800111e8 Packages in this update: golang-github-openprinting-ipp-usb-0.9.30-1.fc41 Update description: 0.9.30, rebuild due golang CVE-2025-22870 Read More
nodejs-nodemon-3.1.9-3.fc41
FEDORA-2025-0951177024 Packages in this update: nodejs-nodemon-3.1.9-3.fc41 Update description: Added patch for CVE-2024-4068 (rhbz#2280624) Read More
nodejs-nodemon-3.1.9-3.fc40
FEDORA-2025-9a278a7768 Packages in this update: nodejs-nodemon-3.1.9-3.fc40 Update description: Added patch for CVE-2024-4068 (rhbz#2280624) Read More
nodejs-nodemon-3.1.9-4.fc42
FEDORA-2025-7d7b644265 Packages in this update: nodejs-nodemon-3.1.9-4.fc42 Update description: Added patch for CVE-2024-4068 (rhbz#2280624) Read More
ZDI-25-148: (0Day) Microsoft Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to...
rust-zincati-0.0.30-1.fc40
FEDORA-2025-43bcbb0795 Packages in this update: rust-zincati-0.0.30-1.fc40 Update description: New upstream release v0.0.30 see: https://github.com/coreos/zincati/releases/tag/v0.0.30 Read More