Skip to content

Commit

Permalink
Ensure all mock threats include a status property
Browse files Browse the repository at this point in the history
  • Loading branch information
nateweller committed Nov 5, 2024
1 parent 2c0935b commit 6af22c1
Showing 1 changed file with 4 additions and 0 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -136,6 +136,7 @@ Default.args = {
'The WooCommerce WordPress plugin was affected by an Authenticated Stored XSS security vulnerability.',
firstDetected: '2024-07-15T21:56:50.000Z',
fixedIn: '3.4.6',
status: 'current',
source: 'https://wpscan.com/vulnerability/7275a176-d579-471a-8492-df8edbdf27de',
extension: {
name: 'WooCommerce',
Expand Down Expand Up @@ -279,6 +280,7 @@ FreeResults.args = {
description:
'Versions 3.2.3 and earlier are affected by an issue where cached queries within shortcodes could lead to object injection. This is related to the recent WordPress 4.8.3 security release.This issue can only be exploited by users who can edit content and add shortcodes, but we still recommend all users running WooCommerce 3.x upgrade to 3.2 to mitigate this issue.',
fixedIn: '3.2.4',
status: 'current',
source: 'https://wpscan.com/vulnerability/1d0470df-4671-47ac-8d87-a165e8f7d502',
extension: {
name: 'WooCommerce',
Expand All @@ -294,6 +296,7 @@ FreeResults.args = {
description:
'The WooCommerce WordPress plugin was affected by an Authenticated Stored XSS security vulnerability.',
fixedIn: '3.4.6',
status: 'current',
source: 'https://wpscan.com/vulnerability/7275a176-d579-471a-8492-df8edbdf27de',
extension: {
name: 'WooCommerce',
Expand All @@ -308,6 +311,7 @@ FreeResults.args = {
description:
'The plugin was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection.\r\n\r\nAnother possible attack vector: from XSS (via another plugin affected by XSS) to RCE.',
fixedIn: '1.7.2',
status: 'current',
source: 'https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3',
extension: {
name: 'WP Super Cache',
Expand Down

0 comments on commit 6af22c1

Please sign in to comment.