István Márton

Organization: Wordfence

1
All Time Ranking
802
All Time Discoveries

About

I'm an experienced WordPress developer, with a focus on plugin development at Lana Solutions. I have spent years focusing on perfecting my skills as a developer, and have recently redirected efforts towards WordPress testing, audits, and vulnerability research. Currently, I'm a vulnerability research contractor for Wordfence and continue to defy the norms by maintaining status as the #1 Researcher in WordPress due to the volume of vulnerabilities I'm able to discover and responsibly disclose.

Submitted 5 Vulnerabilities
Submitted 5 Vulnerabilities
January 17, 2024
Submitted 1 Vulnerability
Submitted 1 Vulnerability
November 27, 2023
Wordfence Vulnerability Researcher
Wordfence Vulnerability Researcher
November 9, 2023

Showing 1-20 of 802 Vulnerabilities

Title CVE ID CVSS Vector Date
PHP to Page <= 0.3 - Authenticated (Subscriber+) Local File Inclusion to Remote Code Execution via Shortcode CVE-2023-5199 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H October 29, 2023
OpenHook <= 4.3.0 - Authenticated (Subscriber+) Remote Code Execution via Shortcode CVE-2023-5201 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H September 29, 2023
Allow PHP in Posts and Pages <= 3.0.4 - Authenticated (Subscriber+) Remote Code Execution via Shortcode CVE-2023-4994 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H September 15, 2023
User Registration <= 3.0.2 - Authenticated (Subscriber+) Arbitrary File Upload CVE-2023-3342 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H July 4, 2023
MW WP Form <= 5.0.1 - Unauthenticated Arbitrary File Upload CVE-2023-6316 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H December 4, 2023
UserPro <= 5.1.1 - Insecure Password Reset Mechanism CVE-2023-2449 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 21, 2023
UserPro <= 5.1.1 - Authentication Bypass to Administrator CVE-2023-2437 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H November 21, 2023
Donation Forms by Charitable <= 1.7.0.12 - Unauthenticated Privilege Escalation CVE-2023-4404 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H August 17, 2023
Stripe Payment Plugin for WooCommerce <= 3.7.7 - Authentication Bypass CVE-2023-3162 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H August 1, 2023
InstaWP Connect <= 0.0.9.18 - Missing Authorization to Unauthenticated Post/Taxonomy/User Add/Change/Delete, Customizer Setting Change, Plugin Installation/Activation/Deactication via events_receiver CVE-2023-3956 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H July 26, 2023
Web3 – Crypto wallet Login & NFT token gating <= 2.6.0 - Authentication Bypass CVE-2023-3249 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H June 29, 2023
WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) <= 7.6.4 - Authentication Bypass CVE-2023-2982 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H June 28, 2023
BookIt <= 2.3.7 - Authentication Bypass CVE-2023-2834 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H June 20, 2023
Abandoned Cart Lite for WooCommerce <= 5.15.1 - Authentication Bypass CVE-2023-2986 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H June 6, 2023
Wordapp <= 1.5.0 - Authorization Bypass through Use of Insufficiently Unique Cryptographic Signature CVE-2023-2987 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H May 30, 2023
WP Directory Kit <= 1.1.9 - Unauthenticated Local File Inclusion via wdk_public_action CVE-2023-2278 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H May 26, 2023
MStore API <= 3.9.2 - Authentication Bypass CVE-2023-2732 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H May 24, 2023
MStore API <= 3.9.1 - Authentication Bypass CVE-2023-2734 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H May 22, 2023
BP Social Connect <= 1.5 - Authentication Bypass CVE-2023-2704 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H May 18, 2023
MStore API <= 3.9.0 - Authentication Bypass CVE-2023-2733 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H May 17, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation