Alex Concha

Vulnerabilities Discovered:

9
All Time Discoveries
1
Discoveries since Aug 30, 2023

9 vulnerabilities

Title CVE ID CVSS Vector Date
My Account Page Editor <= 1.3.1 - Authenticated (Subscriber+) Arbitrary File Upload CVE-2023-4536 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H September 7, 2023
WordPress Core < 6.0.3 - Shared User Instance Weakness 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N October 18, 2022
WordPress Core < 6.0.3 - Authenticated (Admin+) Stored Cross-Site Scripting via Customizer 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N October 18, 2022
WordPress Core < 6.0.3 & Gutenberg < 14.3.1 - Authenticated Cross-Site Scripting in Various Blocks 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N October 18, 2022
WordPress Core < 6.0.3 - Authenticated (Editor+) Stored Cross-Site Scripting via Comments 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N October 18, 2022
WordPress Core < 5.5.2 - Deserialization Gadget CVE-2020-28032 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H October 29, 2020
WordPress Core < 5.5.3 - PHP Object Injection Gadget CVE-2021-29476 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H October 29, 2020
WordPress Core < 3.9.2 - Deserialization via Widgets CVE-2014-5203 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H August 6, 2014
stats <= 1.1 - SQL Injection 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H July 27, 2007

Share this researcher's vulnerability discoveries

All the threat data shared in this database is powered by Wordfence Intelligence Enterprise.
Interested in integrating this data into your platform or network?
Contact us now to discuss API access to our Wordfence Intelligence Enterprise Data Feeds.

Inquire Now

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation