Erwan LR

Organization: WPScan

24
All Time Ranking
121
All Time Discoveries

Showing 21-40 of 121 Vulnerabilities

Title CVE ID CVSS Vector Date
Welcart e-Commerce <= 2.9.4 - Reflected Cross-Site Scripting CVE-2023-5951 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N November 10, 2023
Mmm Simple File List <= 2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode CVE-2023-4514 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 6, 2023
Seraphinite Accelerator (Base, cache only) <= 2.20.31 - Cross-Site Request Forgery CVE-2023-5611 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N October 29, 2023
Seraphinite Accelerator <= 2.20.28 - Arbitrary Redirect via 'redir' CVE-2023-5610 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N October 27, 2023
WP Hotel Booking <= 2.0.8 - Insufficient Authorization to Unauthorized Post Deletion CVE-2023-5799 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N October 26, 2023
ActivityPub <= 0.17.0 - Authenticated (Subscriber+) Insecure Direct Object Reference to Sensitive Post Title Exposure CVE-2023-3706 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N September 25, 2023
ActivityPub <= 0.17.0 - Authenticated (Subscriber+) Insecure Direct Object Reference to Sensitive Post Content Exposure CVE-2023-3707 6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N September 25, 2023
WP Matterport Shortcode <= 2.1.5 - Reflected Cross-Site Scripting CVE-2023-4290 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N September 25, 2023
Herd Effects <= 5.2.3 - Cross-Site Request Forgery to Effect Deletion CVE-2023-4318 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 21, 2023
User Activity Tracking and Log <= 4.0.8 - Cross-Site Request Forgery CVE-2023-4150 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 7, 2023
GDPR Cookie Compliance <= 4.12.4 - Cross-Site Request Forgery to License Modification CVE-2023-4013 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N August 7, 2023
Simple Blog Card <= 1.31 - Sensitive Information Exposure CVE-2023-4036 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N August 3, 2023
MultiParcels Shipping For WooCommerce <= 1.15.1 - Cross-Site Request Forgery CVE-2023-3366 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 31, 2023
MultiParcels Shipping For WooCommerce <= 1.15.3 - Reflected Cross-Site Scripting CVE-2023-3954 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N July 31, 2023
Blog2Social: Social Media Auto Post & Scheduler <= 7.2.0 - Reflected Cross-Site Scripting CVE-2023-3936 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N July 26, 2023
MultiParcels Shipping For WooCommerce <= 1.14.13 - Missing Authorization via get_history CVE-2023-3365 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L July 17, 2023
WPCode <= 2.0.13 - Unauthenticated Reflected Cross-Site Scripting via Tag Filter Links CVE-2023-3524 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N July 17, 2023
MultiParcels Shipping For WooCommerce <= 1.15.3 - Reflected Cross-Site Scripting CVE-2023-3671 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N July 17, 2023
WooCommerce Pre-Orders <= 2.0.2 - Cross-Site Request Forgery CVE-2023-3508 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 10, 2023
WooCommerce Pre-Orders <= 2.0.2 - Cross-Site Request Forgery to Order Cancellation CVE-2023-3507 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N July 10, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation