Participants Database

Information

Software Type Plugin
Software Slug participants-database (view on wordpress.org)
Software Status Active
Software Author xnau
Software Website xnau.com
Software Downloads 1,234,710
Software Active Installs 9,000
Software Record Last Updated November 21, 2024

9 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
Participants Database < 1.5.4.9 - SQL Injection Patched CVE-2014-3961 9.8 Yarubo Research Team June 2, 2014
Participants Database <= 2.5.9.2 - Unauthenticated PHP Object Injection Patched CVE-2024-43141 8.1 LVT-tholv2k August 7, 2024
Participants Database <= 1.9.5.5 - SQL Injection Patched CVE-2020-8596 7.5 Teacish February 10, 2020
Participants Database <= 1.7.5.9 - Unauthorized Cross-Site Scripting Patched CVE-2017-14126 6.1 Benjamin Lim September 6, 2017
Participants Database <= 2.4.9 - Cross-Site Request Forgery via _process_general Patched CVE-2023-31235 5.4 Skalucy May 3, 2023
Participants Database <= 2.5.5 - Missing Authorization Patched CVE-2023-48751 5.3 beluga November 27, 2023
Participants Database <= 2.4.9 - Authenticated(Administrator+) Stored Cross-Site Scripting via plugin settings Patched 4.4 May 3, 2023
Participants Database <= 2.4.5 - Cross Site Request Forgery Patched CVE-2022-47612 4.3 rezaduty January 20, 2023
Participants Database <= 2.4.5 - Cross Site Request Forgery Patched CVE-2022-47612 4.3 rezaduty January 20, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation