|Software Slug||groundhogg (view on wordpress.org)|
|Software Active Installs||2,000|
|Software Record Last Updated||June 1, 2023|
|Groundhogg <= 22.214.171.124 - Cross-Site Request Forgery||CVE-2023-34178||Rafshanzani Suhada||May 30, 2023|
|Groundhogg <= 126.96.36.199 - Authenticated (Administrator+) SQL Injection||CVE-2023-34179||Rafshanzani Suhada||May 30, 2023|
|Groundhogg <= 188.8.131.52 - Missing Authorization to Admin Account and Ticket Creation||CVE-2023-2715||Lana Codes||May 19, 2023|
|Groundhogg <= 184.108.40.206 - Missing Authorization to Update License||CVE-2023-2714||Lana Codes||May 19, 2023|
|Groundhogg <= 220.127.116.11 - Cross-Site Request Forgery to Disable All Plugins||CVE-2023-2717||Lana Codes||May 19, 2023|
|Groundhogg <= 18.104.22.168 - Missing Authorization to Non-Arbitrary File Upload||CVE-2023-2716||Lana Codes||May 19, 2023|
|Groundhogg <= 22.214.171.124 - Cross-Site Request Forgery to Privilege Escalation||CVE-2023-2736||Lana Codes||May 19, 2023|
|Groundhogg <= 126.96.36.199 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode||CVE-2023-2735||Lana Codes||May 19, 2023|
|Groundhogg <= 188.8.131.52 - Authenticated (Administrator)+ SQL Injection||CVE-2023-1425||rSolutions Security Team||March 20, 2023|
|Groundhogg <= 184.108.40.206 - SQL Injection||Lucian Ioan Nitescu||October 23, 2019|
|Groundhogg <= 220.127.116.11 - Reflected Cross-Site Scripting||Lucian Ioan Nitescu||September 10, 2019|
|WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg < 1.3.5 - Remote Code Execution||CVE-2019-15647||April 8, 2019|
All the threat data shared in this database is powered by Wordfence Intelligence Enterprise.
Interested in integrating this data into your platform or network?
Contact us now to discuss API access to our Wordfence Intelligence Enterprise Data Feeds.
Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.
The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.Documentation