Erwan LR

Organization: WPScan

34
All Time Ranking
125
All Time Discoveries
0
90 Day Published Submissions
N/A
Last Published Submission

Showing 21-40 of 125 Vulnerabilities

Title CVE ID CVSS Vector Date
EventON - WordPress Virtual Event Calendar Plugin <= 4.5.8 (Pro) & <= 2.2.7 (Free) - Missing Authorization via eventon_save_virtual_event_settings CVE-2024-0237 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N January 10, 2024
Community by PeepSo <= 6.3.1.1 - Reflected Cross-Site Scripting CVE-2024-0187 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N January 9, 2024
Email Subscription Popup <= 1.2.19 - Reflected Cross-Site Scripting CVE-2023-6555 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N December 15, 2023
EmbedPress <= 3.9.1 - Reflected Cross-Site Scripting CVE-2023-5750 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 17, 2023
Welcart e-Commerce <= 2.9.4 - Reflected Cross-Site Scripting CVE-2023-5951 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 10, 2023
Mmm Simple File List <= 2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode CVE-2023-4514 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 6, 2023
Seraphinite Accelerator (Base, cache only) <= 2.20.31 - Cross-Site Request Forgery CVE-2023-5611 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N October 29, 2023
Seraphinite Accelerator <= 2.20.28 - Arbitrary Redirect via 'redir' CVE-2023-5610 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N October 27, 2023
WP Hotel Booking <= 2.0.8 - Insufficient Authorization to Unauthorized Post Deletion CVE-2023-5799 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N October 26, 2023
WP Matterport Shortcode <= 2.1.5 - Reflected Cross-Site Scripting CVE-2023-4290 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N September 25, 2023
ActivityPub <= 0.17.0 - Authenticated (Subscriber+) Insecure Direct Object Reference to Sensitive Post Content Exposure CVE-2023-3707 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N September 25, 2023
ActivityPub <= 0.17.0 - Authenticated (Subscriber+) Insecure Direct Object Reference to Sensitive Post Title Exposure CVE-2023-3706 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N September 25, 2023
Herd Effects <= 5.2.3 - Cross-Site Request Forgery to Effect Deletion CVE-2023-4318 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 21, 2023
User Activity Tracking and Log <= 4.0.8 - Cross-Site Request Forgery CVE-2023-4150 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 7, 2023
GDPR Cookie Compliance <= 4.12.4 - Cross-Site Request Forgery to License Modification CVE-2023-4013 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 7, 2023
Simple Blog Card <= 1.31 - Sensitive Information Exposure CVE-2023-4036 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N August 3, 2023
MultiParcels Shipping For WooCommerce <= 1.15.3 - Reflected Cross-Site Scripting CVE-2023-3954 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N July 31, 2023
MultiParcels Shipping For WooCommerce <= 1.15.1 - Cross-Site Request Forgery CVE-2023-3366 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 31, 2023
Blog2Social: Social Media Auto Post & Scheduler <= 7.2.0 - Reflected Cross-Site Scripting CVE-2023-3936 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N July 26, 2023
MultiParcels Shipping For WooCommerce <= 1.14.13 - Missing Authorization via get_history CVE-2023-3365 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L July 17, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation