CVE-2025-28862 |
Description: Cross-Site Request Forgery (CSRF) vulnerability in Venugopal Comment Date and Gravatar remover allows Cross Site Request Forgery. This issue affects Comment Date and Gravatar remover: from n/a through 1.0.
CVSS: MEDIUM (4.3) EPSS Score: 0.02%
March 11th, 2025 (4 months ago)
|
CVE-2025-28861 |
Description: Cross-Site Request Forgery (CSRF) vulnerability in bhzad WP jQuery Persian Datepicker allows Stored XSS. This issue affects WP jQuery Persian Datepicker: from n/a through 0.1.0.
CVSS: HIGH (7.1) EPSS Score: 0.02%
March 11th, 2025 (4 months ago)
|
CVE-2025-28860 |
Description: Cross-Site Request Forgery (CSRF) vulnerability in PPDPurveyor Google News Editors Picks Feed Generator allows Stored XSS. This issue affects Google News Editors Picks Feed Generator: from n/a through 2.1.
CVSS: HIGH (7.1) EPSS Score: 0.02%
March 11th, 2025 (4 months ago)
|
CVE-2025-28859 |
Description: Cross-Site Request Forgery (CSRF) vulnerability in CodeVibrant Maintenance Notice allows Cross Site Request Forgery. This issue affects Maintenance Notice: from n/a through 1.0.5.
CVSS: MEDIUM (4.3) EPSS Score: 0.02%
March 11th, 2025 (4 months ago)
|
CVE-2025-28857 |
Description: Cross-Site Request Forgery (CSRF) vulnerability in rankchecker Rankchecker.io Integration allows Stored XSS. This issue affects Rankchecker.io Integration: from n/a through 1.0.9.
CVSS: HIGH (7.1) EPSS Score: 0.02%
March 11th, 2025 (4 months ago)
|
CVE-2025-28856 |
Description: Cross-Site Request Forgery (CSRF) vulnerability in dangrossman W3Counter Free Real-Time Web Stats allows Cross Site Request Forgery. This issue affects W3Counter Free Real-Time Web Stats: from n/a through 4.1.
CVSS: MEDIUM (4.3) EPSS Score: 0.02%
March 11th, 2025 (4 months ago)
|
CVE-2025-1707 |
Description: The Review Schema plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.2.4 via post meta. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.
CVSS: HIGH (8.8) EPSS Score: 0.1%
March 11th, 2025 (4 months ago)
|
![]() |
Description:
Web App Scanning Plugin ID 114618 with Critical Severity
Synopsis
GiveWP Plugin for WordPress < 3.20.0 Remote Code Execution
Description
The WordPress GiveWP Plugin installed on the remote host is affected by a PHP object injection vulnerability.Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade to GiveWP Plugin for WordPress 3.20.0 or latest.
Read more at https://www.tenable.com/plugins/was/114618
March 11th, 2025 (4 months ago)
|
![]() |
Description:
Web App Scanning Plugin ID 114629 with Critical Severity
Synopsis
Newscrunch Plugin for WordPress < 1.8.4.1 Arbitrary File Upload
Description
The WordPress Newscrunch Plugin installed on the remote host is affected by an Arbitrary File Upload.Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Upgrade to Newscrunch 1.8.4.1 or later.
Read more at https://www.tenable.com/plugins/was/114629
March 11th, 2025 (4 months ago)
|
CVE-2024-13228 |
Description: The Qubely – Advanced Gutenberg Blocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.13 via the 'qubely_get_content'. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, scheduled, password-protected, draft, and trashed post data.
CVSS: MEDIUM (4.3) EPSS Score: 0.03%
March 11th, 2025 (4 months ago)
|