Real Estate 7 WordPress

Information

Software Type Theme
Software Slug realestate-7
Software Status Active
Software Author contempoinc
Software Website themeforest.net
Software Active Installs 9,892
Software Record Last Updated January 27, 2025

10 Vulnerabilities

Title Status CVE ID CVSS Researchers Date
Real Estate 7 WordPress <= 3.5.1 - Unauthenticated Privilege Escalation to Administrator Patched CVE-2024-13421 9.8 Lucio Sá February 11, 2025
Real Estate 7 Theme <= 3.3.4 - Unauthenticated Arbitrary Email Sending Patched 5.8 R3N0 March 9, 2023
Real Estate 7 <= 3.3.4 - Cross-Site Request Forgery Patched 5.4 R3N0 March 1, 2023
Real Estate 7 <= 3.3.4 - Reflected Cross-Site Scripting via ct_additional_features Patched 6.1 R3N0 February 28, 2023
Real Estate 7 Theme <= 3.3.1 - Stored Cross-Site Scripting Patched CVE-2022-47146 7.2 R3N0 February 20, 2023
WP Pro Real Estate 7 < 3.1.1 - Reflected Cross-Site Scripting Patched CVE-2021-24387 6.1 R3N0 June 10, 2021
Real Estate 7 WordPress < 3.0.6 - Reflected Cross-Site Scripting Patched 6.1 R3N0 August 29, 2020
Real Estate 7 <= 3.0.3 - Reflected Cross-Site Scripting Patched 6.1 R3N0 July 23, 2020
Real Estate 7 WordPress < 2.9.5 - Multiple Vulnerabilities Patched 6.4 R3N0 January 14, 2020
Real Estate 7 WordPress Theme < 2.9.1 - Stored Cross-Site Scripting Patched 6.4 R3N0 July 20, 2019

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation