WP Post Author – Boost Your Blog's Engagement with Author Box, Social Links, Co-Authors, Guest Authors, Post Rating System, and Custom User Registration Form Builder

Information

Software Type Plugin
Software Slug wp-post-author (view on wordpress.org)
Software Status Active
Software Author afthemes
Software Website afthemes.com
Software Downloads 733,336
Software Active Installs 10,000
Software Record Last Updated December 21, 2024

5 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
Boost Your Blog's Engagement with WP Post Author <= 3.8.1 - Authenticated (Administrator+) SQL Injection Patched CVE-2024-8757 7.2 Lesor101 October 11, 2024
WP Post Author <= 3.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting Patched CVE-2024-37101 6.4 Khalid June 20, 2024
WP Post Author – Enhance Your Posts with the Author Bio, Co-Authors, Guest Authors, and Post Rating System, including User Registration Form Builder <= 3.7.4 - Missing Authorization Patched CVE-2024-34389 4.3 Kyle Sanchez May 6, 2024
WP Post Author – Enhance Your Posts with the Author Bio, Co-Authors, Guest Authors, and Post Rating System, including User Registration Form Builder <= 3.6.4 - Missing Authorization to Rating Manipulation Patched CVE-2024-34387 4.3 Kyle Sanchez May 6, 2024
WP Post Author <= 3.2.3 - Privilege Escalation Patched 9.8 June 28, 2023

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation