5
All Time Ranking
416
All Time Discoveries
5
90 Day Published Submissions
11 Dec '24
Last Published Submission
Submitted 5 Vulnerabilities
Submitted 5 Vulnerabilities
December 11, 2024
Submitted 1 Vulnerability
Submitted 1 Vulnerability
September 24, 2024

Showing 141-160 of 416 Vulnerabilities

Title CVE ID CVSS Vector Date
uCAT – Next Story <= 2.0.0 - Reflected Cross-Site Scripting CVE-2024-49663 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N October 21, 2024
WooCommerce Maintenance Mode <= 2.0.1 - Reflected Cross-Site Scripting CVE-2024-49651 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N October 21, 2024
Mitm Bug Tracker <= 1.0 - Reflected Cross-Site Scripting CVE-2024-49224 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N October 14, 2024
Featured Posts with Multiple Custom Groups (FPMCG) <= 4.0 - Reflected Cross-Site Scripting CVE-2024-48032 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N October 9, 2024
Restaurant Reservations Widget <= 1.0 - Reflected Cross-Site Scripting CVE-2024-48023 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N October 9, 2024
Action Network <= 1.4.2 - Reflected Cross-Site Scripting via 'search' CVE-2024-25921 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N February 14, 2024
Smart External Link Click Monitor [Link Log] <= 5.0.2 - Reflected Cross-Site Scripting CVE-2023-49771 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N December 5, 2023
Maspik – Spam blacklist <= 0.9.2 - Unauthenticated Stored Cross-Site Scripting via efas_add_to_log CVE-2023-48272 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 21, 2023
Plainview Protect Passwords <= 1.4 - Reflected Cross-Site Scripting CVE-2023-47665 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 8, 2023
Motors – Car Dealer & Classified Ads <= 1.4.6 - Reflected Cross-Site Scripting CVE-2023-46208 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N October 19, 2023
Attorney <= 3 - Reflected Cross-Site Scripting CVE-2023-41692 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N September 4, 2023
Business Pro <= 1.10.4 - Reflected Cross-Site Scripting CVE-2023-40214 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N August 10, 2023
Easy Google Analytics for WordPress <= 1.6.0 - Cross-Site Request Forgery CVE-2023-23887 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N February 20, 2023
WordPress Comments Import & Export <= 2.3.1 - CSV Injection CVE-2022-45370 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L February 6, 2023
Atahualpa <= 3.7.24 - Cross-Site Scripting via Cross-Site Request Forgery CVE-2024-27948 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N March 1, 2017
Emails & Newsletters with Jackmail <= 1.2.22 - Authenticated (Subscriber+) CSV Injecton CVE-2022-46821 6.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L April 28, 2023
Export Users Data CSV <= 2.1 - Authenticated (Subscriber+) CSV Injection CVE-2022-41616 6.0 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L November 30, 2022
User Blocker <= 1.5.5 - Authenticated (Admin+) CSV Injection CVE-2022-45078 5.9 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L November 9, 2022
BEAR <= 1.1.4 - Authenticated (Shop manager+) Stored Cross-Site Scripting via Plugin Options CVE-2024-24834 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N February 2, 2024
Download Monitor <= 4.8.1 - Authenticated (Admin+) Server-Side Request Forgery CVE-2023-31219 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N May 30, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation