cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forenable-media-replace enable-media-replace

Direction: ascending
Jun 06, 2024

Enable Media Replace # CVE-2023-0255

CVE, Research URL

CVE-2023-0255

Application

Enable Media Replace

Date
Feb 13, 2023
Research Description
The Enable Media Replace WordPress plugin before 4.0.2 does not prevent authors from uploading arbitrary files to the site, which may allow them to upload PHP shells on affected sites.
Affected versions
max 4.0.2.
Status
vulnerable

Enable Media Replace # CVE-2023-6737

CVE, Research URL

CVE-2023-6737

Application

Enable Media Replace

Date
Jan 11, 2024
Research Description
The Enable Media Replace plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the SHORTPIXEL_DEBUG parameter in all versions up to, and including, 4.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Exploiting this vulnerability requires the attacker to know the ID of an attachment uploaded by the user they are attacking.
Affected versions
max 4.1.5.
Status
vulnerable

Enable Media Replace # 998cd782c633045e5da1cdac6b7b7cd2ce8eb0d2

Application

Enable Media Replace

Date
Feb 09, 2011
Research Description
Enable Media Replace [enable-media-replace] < 2.4 (closed) WordPress Enable Media Replace Plugin - Multiple Vulnerabilities In general, impact of this plugin is information retrieval and manipulation, arbitrary code execution. More details: there exist multiple vulnerabilities in Enable Media Replace plugin for WordPress: 1. Users can perform SQL injection attacks against the plugin. 2. Users can upload arbitrary files (for the example, PHP files) to retrieve or change important information in the SQL database.
Affected versions
max 2.4.
Status
vulnerable

Enable Media Replace # CVE-2022-2554

CVE, Research URL

CVE-2022-2554

Application

Enable Media Replace

Date
Oct 11, 2022
Research Description
The Enable Media Replace WordPress plugin before 4.0.0 does not ensure that renamed files are moved to the Upload folder, which could allow high privilege users such as admin to move them outside to the web root directory via a path traversal attack for example
Affected versions
max 2.4.
Status
vulnerable

Enable Media Replace # CVE-2023-4643

CVE, Research URL

CVE-2023-4643

Application

Enable Media Replace

Date
Oct 17, 2023
Research Description
The Enable Media Replace WordPress plugin before 4.1.3 unserializes user input via the Remove Background feature, which could allow Author+ users to perform PHP Object Injection when a suitable gadget is present on the blog
Affected versions
max 4.1.3.
Status
vulnerable
Apr 02, 2025

Enable Media Replace # CVE-2025-31081

CVE, Research URL

CVE-2025-31081

Application

Enable Media Replace

Date
Apr 02, 2025
Research Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ShortPixel Enable Media Replace allows Reflected XSS. This issue affects Enable Media Replace: from n/a through 4.1.5.
Affected versions
max 4.1.6.
Status
vulnerable
Dec 10, 2025

Enable Media Replace # CVE-2025-9496

CVE, Research URL

CVE-2025-9496

Application

Enable Media Replace

Date
Oct 11, 2025
Research Description
The Enable Media Replace plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's file_modified shortcode in all versions up to, and including, 4.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
max 4.1.7.
Status
vulnerable