Lokesh Dachepalli

Vulnerabilities Discovered:

11
All Time Discoveries
0
Discoveries since Aug 30, 2023

11 vulnerabilities

Title CVE ID CVSS Vector Date
Localize Remote Images <= 1.0.9 - Cross-Site Request Forgery via admin menu CVE-2023-41244 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N August 29, 2023
Custom Admin Login Page | WPZest <= 1.2.0 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-40329 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N August 16, 2023
Gestion-Pymes <= 1.5.6 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-38397 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N July 20, 2023
Sunny Search <= 1.0.2 - Cross-Site Request Forgery to Settings Update CVE-2023-32592 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N May 12, 2023
Sunny Search <= 1.0.2 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings CVE-2023-32595 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N May 12, 2023
weebotLite <= 1.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings CVE-2023-32596 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N May 12, 2023
Reservation.Studio widget <= 1.0.11 - Cross-Site Request Forgery via plugin settings CVE-2023-25468 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N April 19, 2023
Easy Ad Manager <= 1.0.0 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-25460 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N April 19, 2023
Chat Bee <= 1.1.0 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-26538 4.4 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N February 24, 2023
PayGreen – Ancienne version <= 4.10.2 - Cross-Site Request Forgery CVE-2023-25986 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H February 20, 2023
Interactive SVG Image Map Builder <= 1.0 - Authenticated(Admin+) Stored Cross-Site Scripting CVE-2023-25704 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N February 14, 2023

Share this researcher's vulnerability discoveries

All the threat data shared in this database is powered by Wordfence Intelligence Enterprise.
Interested in integrating this data into your platform or network?
Contact us now to discuss API access to our Wordfence Intelligence Enterprise Data Feeds.

Inquire Now

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation