Khalid

110
All Time Ranking
21
All Time Discoveries

Showing 1-20 of 21 Vulnerabilities

Title CVE ID CVSS Vector Date
RomethemeKit For Elementor <= 1.4.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-32956 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 22, 2024
AI Infographic Maker <= 4.6.7 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-32696 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N April 19, 2024
HelloAsso <= 1.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-32697 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 19, 2024
WP-FormAssembly <= 2.0.10 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2023-49768 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 16, 2024
Mega Elements <= 1.1.9 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-32575 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 16, 2024
Void Elementor WHMCS Elements For Elementor Page Builder <= 2.0 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-32592 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 16, 2024
Attesa Extra <= 1.3.9 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-32594 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 16, 2024
Envo Extra <= 1.8.11 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-32456 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 15, 2024
DethemeKit For Elementor <= 2.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-32508 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 15, 2024
Elements Plus! <= 2.16.3 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-32457 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 15, 2024
Jobs for WordPress <= 2.7.5 - Reflected Cross-Site Scripting CVE-2024-32149 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 12, 2024
Sangar Slider <= 1.3.2 - Cross-Site Request Forgery CVE-2024-32091 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 11, 2024
Royal Elementor Addons <= 1.3.93 - Authenticated (Contributor+) Stored Cross-Site Scriting CVE-2024-31236 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 5, 2024
Premium Addons for Elementor <= 4.10.22 - Authenticated (Contributor+) Sensitive Information Exposure CVE-2024-31278 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N April 5, 2024
Testimonials <= 3.0.5 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-31348 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 5, 2024
Gradient Text Widget for Elementor <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-31346 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N April 5, 2024
Awesome Support <= 6.1.7 - Missing Authorization CVE-2024-30539 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N March 29, 2024
PDF Viewer for Elementor <= 2.9.3 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-30524 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N March 29, 2024
Hash Elements <= 1.3.3 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-30426 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N March 28, 2024
Better Elementor Addons <= 1.3.7 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2024-30423 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N March 28, 2024

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation