NextScripts: Social Networks Auto-Poster

Information

Software Type Plugin
Software Slug social-networks-auto-poster-facebook-twitter-g (view on wordpress.org)
Software Status Removed
Software Author nextscripts
Software Website www.nextscripts.com
Software Downloads 7,335,373
Software Active Installs 50,000
Software Record Last Updated April 16, 2024

8 Vulnerabilities

Title CVE ID CVSS Researchers Date
NextScripts <= 4.4.2 - Reflected Cross-Site Scripting via code CVE-2023-49183 6.1 Le Ngoc Anh November 29, 2023
NextScripts: Social Networks Auto-Poster <= 4.3.25 - Reflected Cross-Site Scripting 6.1 July 4, 2022
NextScripts: Social Networks Auto-Poster <= 4.3.23 - Unauthenticated Stored Cross-Site Scripting CVE-2021-24975 6.1 Krzysztof Zając January 3, 2022
NextScripts: Social Networks Auto-Poster <= 4.3.24 - Arbitrary Post Deletion via Cross-Site Request Forgery CVE-2021-25072 6.5 Krzysztof Zając January 3, 2022
NextScripts: Social Networks Auto-Poster <= 4.3.20 - Reflected Cross-Site Scripting CVE-2021-38356 6.1 Ram November 28, 2021
NextScripts: Social Networks Auto-Poster <= 4.3.17 - Missing Authorization 6.4 John Castro September 5, 2020
NextScripts: Social Networks Auto-Poster <= 4.2.7 - Reflected Cross-Site Scripting CVE-2019-9911 6.1 Tim Coen February 5, 2019
NextScripts: Social Networks Auto-Poster <= 3.4.17 - Stored Cross-Site Scripting 7.2 James Hooker May 25, 2015

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation