Marco Wotschka

Organization: Wordfence

9
All Time Ranking
228
All Time Discoveries
Wordfence Vulnerability Researcher
Wordfence Vulnerability Researcher
November 13, 2023

Showing 21-40 of 228 Vulnerabilities

Title CVE ID CVSS Vector Date
Permalink Manager Lite <= 2.2.20.1 - Cross-Site Request Forgery CVE-2022-4021 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H November 16, 2022
SVG Support 2.5 - 2.5.1 - Insecure Plugin Defaults to Cross-Site Scripting CVE-2022-4022 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 16, 2022
WP User <= 7.0 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2022-4519 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N December 6, 2022
Mega Addons For WPBakery Page Builder <= 4.2.7 - Authenticated (Subscriber+) Settings Update CVE-2022-4501 7.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L December 14, 2022
Mediamatic – Media Library Folders <= 2.8.1 - Missing Authorization CVE-2023-0293 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N December 14, 2022
Swifty Page Manager <= 3.0.1 - Cross-Site Request Forgery CVE-2023-0088 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H December 14, 2022
Swifty Page Manager <= 3.0.1 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-0087 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N December 14, 2022
Mediamatic – Media Library Folders <= 2.8.1 - Cross-Site Request Forgery CVE-2023-0294 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H December 14, 2022
Sidebar Widgets by CodeLights <= 1.4 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2022-4619 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N December 19, 2022
Waiting: One-click countdowns <= 0.6.2 - Missing Authorization CVE-2023-3999 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L December 23, 2022
ProfilePress <= 4.5.0 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2022-4697 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N December 23, 2022
Waiting: One-click countdowns <= 0.6.2 - Authenticated (Administrator+) Cross-Site Scripting CVE-2022-4954 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N December 23, 2022
Events Made Easy <= 2.3.16 - Missing Authorization CVE-2023-0404 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N December 23, 2022
Waiting: One-click countdowns <= 0.6.2 - Cross-Site Request Forgery CVE-2023-4000 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L December 23, 2022
My YouTube Channel <= 3.0.12.1 - Missing Authorization CVE-2023-0447 4.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N January 4, 2023
My YouTube Channel <= 3.0.12.1 - Authenticated (Administrator+) Stored Cross-Site Scripting CVE-2023-0446 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N January 4, 2023
Social Warfare <= 4.3.0 - Missing Authorization CVE-2023-0402 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L January 5, 2023
Social Warfare <= 4.3.1 - Cross-Site Request Forgery CVE-2023-0403 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L January 5, 2023
ContentStudio <= 1.2.5 - Missing Authorization CVE-2023-0556 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H January 6, 2023
Launchpad – Coming Soon & Maintenance Mode Plugin <= 1.0.13 - Authenticated (Administrator+) Cross-Site Scripting CVE-2023-0295 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N January 13, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation