Marco Wotschka

Organization: Wordfence

9
All Time Ranking
228
All Time Discoveries
Wordfence Vulnerability Researcher
Wordfence Vulnerability Researcher
November 13, 2023

Showing 41-60 of 228 Vulnerabilities

Title CVE ID CVSS Vector Date
Auto Amazon Links <= 5.3.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via style CVE-2023-4482 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N September 5, 2023
BigBlueButton <= 3.0.0-beta.4 - Authenticated (Author+) Stored Cross-Site Scripting 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N August 17, 2023
Cost Calculator <= 1.8 - Authenticated (Contributor+) Stored Cross-Site Scripting CVE-2023-1155 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N March 2, 2023
Interactive Geo Maps <= 1.5.9 - Authenticated (Editor+) Stored Cross-Site Scripting CVE-2023-0731 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N February 7, 2023
SVG Support 2.5 - 2.5.1 - Insecure Plugin Defaults to Cross-Site Scripting CVE-2022-4022 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 16, 2022
Photospace Gallery <= 2.3.5 - Authenticated (Subscriber+) Stored Cross-Site Scripting CVE-2022-3991 6.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N November 14, 2022
RapidLoad Power-Up for Autoptimize <= 1.7.1 - Cross-Site Request Forgery CVE-2023-1472 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L March 17, 2023
Waiting: One-click countdowns <= 0.6.2 - Cross-Site Request Forgery CVE-2023-4000 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L December 23, 2022
Waiting: One-click countdowns <= 0.6.2 - Missing Authorization CVE-2023-3999 6.3 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L December 23, 2022
Order Tracking Pro <= 3.3.6 - Reflected Cross-Site Scripting CVE-2023-4471 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N August 28, 2023
BigBlueButton <= 3.0.0-beta.4 - Reflected Cross-Site Scripting CVE-2023-39991 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N August 9, 2023
Woo Custom Emails <= 2.2 - Reflected Cross-Site Scripting via wcemails_edit CVE-2023-4315 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N August 2, 2023
Video Gallery <= 1.0.10 - Reflected Cross-Site Scripting CVE-2023-2708 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N May 15, 2023
video carousel slider with lightbox <= 1.0.22 - Reflected Cross-Site Scripting CVE-2023-2710 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N May 15, 2023
Team Circle Image Slider With Lightbox <= 1.0.17 - Reflected Cross-Site Scripting CVE-2023-2604 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N May 9, 2023
Photo Gallery Slideshow & Masonry Tiled Gallery <= 1.0.13 - Reflected Cross-Site Scripting CVE-2023-2402 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 28, 2023
wordpress vertical image slider plugin <= 1.2.16 - Reflected Cross-Site Scripting CVE-2023-2289 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 25, 2023
WP Responsive Tabs horizontal vertical and accordion Tabs <= 1.1.15 - Reflected Cross-Site Scripting CVE-2023-2184 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 19, 2023
Video Grid <= 1.21 - Reflected Cross-Site Scripting 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 18, 2023
Responsive Filterable Portfolio <= 1.0.19 - Reflected Cross-Site Scripting CVE-2023-2119 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N April 17, 2023

Share this researcher's vulnerability discoveries

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation