Software Type | Plugin |
---|---|
Software Slug | blocksy-companion (view on wordpress.org) |
Software Status | Active |
Software Author | creativethemeshq |
Software Downloads | 10,382,429 |
Software Active Installs | 200,000 |
Software Record Last Updated | December 21, 2024 |
Title | Status | CVE ID | CVSS | Researchers | Date |
---|---|---|---|---|---|
Blocksy Companion <= 2.0.42 - Authenticated (Admin+) Server-Side Request Forgery | Patched | CVE-2024-35633 | Yuchen Ji | May 30, 2024 | |
Blocksy Companion <= 2.0.45 - Authenticated (Contributor+) Stored Cross-Site Scripting via SVG Uploads | Patched | CVE-2024-4487 | wesley (wcraft) | May 10, 2024 | |
Blocksy Companion <= 2.0.28 - Cross-Site Request Forgery | Patched | CVE-2024-31932 | RE-ALTER | April 10, 2024 | |
Blocksy Companion <= 2.0.31 - Authenticated (Contributor+) Stored Cross-Site Scripting | Patched | CVE-2024-2392 | Ngô Thiên An (ancorn_) | March 21, 2024 | |
Blocksy Companion <= 1.8.81 - Authenticated(Subscriber+) Sensitive Information Exposure via blocksy_posts shortcode | Patched | CVE-2023-1911 | Erwan LR | April 10, 2023 | |
Blocksy Companion <= 1.8.67 - Authenticated (Contributor+) Stored Cross-Site Scripting | Patched | CVE-2023-23898 | Rafshanzani Suhada | January 27, 2023 | |
Freemius SDK <= 2.4.2 - Missing Authorization Checks | Patched | CVE-2022-4974 | March 4, 2022 |
Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!
Learn moreWant to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.
The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.
Documentation