WordPress Infinite Scroll – Ajax Load More

Information

Software Type Plugin
Software Slug ajax-load-more (view on wordpress.org)
Software Status Active
Software Author connekthq
Software Website connekthq.com
Software Downloads 1,579,931
Software Active Installs 50,000
Software Record Last Updated May 20, 2023

8 vulnerabilities

Title CVE ID CVSS Researchers Date
WordPress Infinite Scroll - Ajax Load More <= 5.6.0.2 - Authenticated (Contributor+) Stored Cross Site Scripting via Shortcode CVE-2022-4466 6.4 Lana Codes February 27, 2023
Infinite Scroll – Ajax Load More <= 5.5.4 - Authenticated (Admin+) Arbitrary File Read via Directory Traversal 4.9 August 31, 2022
WordPress Infinite Scroll – Ajax Load More <= 5.5.3 - Cross-Site Request Forgery to PHAR Deserialization CVE-2022-2433 8.8 Rasoul Jahanshahi August 22, 2022
WordPress Infinite Scroll – Ajax Load More <= 5.5.3 - Authenticated (Admin+) Arbitrary File Read CVE-2022-2943 4.9 Muhammad Zeeshan (Xib3rR4dAr) August 22, 2022
WordPress Infinite Scroll – Ajax Load More <= 5.5.3 - Directory Traversal CVE-2022-2945 4.9 Muhammad Zeeshan (Xib3rR4dAr) August 22, 2022
Ajax Load More plugin < 5.3.2 - SQL Injection CVE-2021-24140 7.2 Nguyen Van Khanh May 18, 2020
Ajax Load More < 2.11.2 - Local File Inclusion 9.8 Burak Kelebek August 15, 2016
WordPress Infinite Scroll – Ajax Load More <= 2.8.1.1 - Arbitrary File Upload 8.8 October 10, 2015

All the threat data shared in this database is powered by Wordfence Intelligence Enterprise.
Interested in integrating this data into your platform or network?
Contact us now to discuss API access to our Wordfence Intelligence Enterprise Data Feeds.

Inquire Now

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation