Erwan LR

Organization: WPScan

34
All Time Ranking
125
All Time Discoveries
0
90 Day Published Submissions
N/A
Last Published Submission

Showing 101-120 of 125 Vulnerabilities

Title CVE ID CVSS Vector Date
WooCommerce Customers Manager <= 29.7 - Missing Authorization to Information Exposure CVE-2024-1756 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N April 2, 2024
WooCommerce Cart Abandonment Recovery <= 1.2.26 - Cross-Site Request Forgery to Templates/Abandoned Orders Deletion CVE-2024-2322 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N March 13, 2024
Themify – WooCommerce Product Filter <= 1.4.3 - Cross-Site Request Forgery CVE-2024-2262 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N March 11, 2024
Enjoy Social Feed plugin for WordPress website <= 6.2.2 - Missing Authorization to Database Reset CVE-2024-0780 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N February 20, 2024
Seraphinite Accelerator (Base, cache only) <= 2.20.31 - Cross-Site Request Forgery CVE-2023-5611 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N October 29, 2023
WP Hotel Booking <= 2.0.8 - Insufficient Authorization to Unauthorized Post Deletion CVE-2023-5799 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N October 26, 2023
ActivityPub <= 0.17.0 - Authenticated (Subscriber+) Insecure Direct Object Reference to Sensitive Post Title Exposure CVE-2023-3706 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N September 25, 2023
Herd Effects <= 5.2.3 - Cross-Site Request Forgery to Effect Deletion CVE-2023-4318 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 21, 2023
User Activity Tracking and Log <= 4.0.8 - Cross-Site Request Forgery CVE-2023-4150 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 7, 2023
GDPR Cookie Compliance <= 4.12.4 - Cross-Site Request Forgery to License Modification CVE-2023-4013 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 7, 2023
Simple Blog Card <= 1.31 - Sensitive Information Exposure CVE-2023-4036 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N August 3, 2023
MultiParcels Shipping For WooCommerce <= 1.15.1 - Cross-Site Request Forgery CVE-2023-3366 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 31, 2023
WooCommerce Pre-Orders <= 2.0.2 - Cross-Site Request Forgery CVE-2023-3508 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 10, 2023
WooCommerce Pre-Orders <= 2.0.2 - Cross-Site Request Forgery to Order Cancellation CVE-2023-3507 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 10, 2023
Caldera Forms Google Sheets Connector <= 1.3 - Cross-Site Request Forgery CVE-2023-2330 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N June 26, 2023
WooCommerce Google Sheet Connector <= 1.3.9 - Cross-Site Request Forgery CVE-2023-2329 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N June 26, 2023
POST SMTP Mailer <= 2.5.6 - Cross-Site Request Forgery to Arbitrary Log Deletion CVE-2023-3178 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N June 26, 2023
Blocksy Companion <= 1.8.81 - Authenticated(Subscriber+) Sensitive Information Exposure via blocksy_posts shortcode CVE-2023-1911 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N April 10, 2023
WP VR <= 8.2.9 - Missing Authorization CVE-2023-1414 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N March 29, 2023
W4 Post List <= 2.4.5 - Information Disclosure via post_excerpt CVE-2023-1371 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N March 22, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation