Vulnerabilities and security researches forenable-media-replace enable-media-replace
Direction: ascendingJun 06, 2024
Enable Media Replace # CVE-2023-0255
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 13, 2023
- Research Description
- The Enable Media Replace WordPress plugin before 4.0.2 does not prevent authors from uploading arbitrary files to the site, which may allow them to upload PHP shells on affected sites.
- Affected versions
-
max 4.0.2.
- Status
-
vulnerable
Enable Media Replace # CVE-2023-6737
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 11, 2024
- Research Description
- The Enable Media Replace plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the SHORTPIXEL_DEBUG parameter in all versions up to, and including, 4.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Exploiting this vulnerability requires the attacker to know the ID of an attachment uploaded by the user they are attacking.
- Affected versions
-
max 4.1.5.
- Status
-
vulnerable
Enable Media Replace # 998cd782c633045e5da1cdac6b7b7cd2ce8eb0d2
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 09, 2011
- Research Description
- Enable Media Replace [enable-media-replace] < 2.4 (closed) WordPress Enable Media Replace Plugin - Multiple Vulnerabilities In general, impact of this plugin is information retrieval and manipulation, arbitrary code execution. More details: there exist multiple vulnerabilities in Enable Media Replace plugin for WordPress: 1. Users can perform SQL injection attacks against the plugin. 2. Users can upload arbitrary files (for the example, PHP files) to retrieve or change important information in the SQL database.
- Affected versions
-
max 2.4.
- Status
-
vulnerable
Enable Media Replace # CVE-2022-2554
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 11, 2022
- Research Description
- The Enable Media Replace WordPress plugin before 4.0.0 does not ensure that renamed files are moved to the Upload folder, which could allow high privilege users such as admin to move them outside to the web root directory via a path traversal attack for example
- Affected versions
-
max 2.4.
- Status
-
vulnerable
Enable Media Replace # CVE-2023-4643
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 17, 2023
- Research Description
- The Enable Media Replace WordPress plugin before 4.1.3 unserializes user input via the Remove Background feature, which could allow Author+ users to perform PHP Object Injection when a suitable gadget is present on the blog
- Affected versions
-
max 4.1.3.
- Status
-
vulnerable
Apr 02, 2025
Enable Media Replace # CVE-2025-31081
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 02, 2025
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ShortPixel Enable Media Replace allows Reflected XSS. This issue affects Enable Media Replace: from n/a through 4.1.5.
- Affected versions
-
max 4.1.6.
- Status
-
vulnerable
Dec 10, 2025
Enable Media Replace # CVE-2025-9496
- CVE, Research URL
- Home page URL
- Application
- Date
- Oct 11, 2025
- Research Description
- The Enable Media Replace plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's file_modified shortcode in all versions up to, and including, 4.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
max 4.1.7.
- Status
-
vulnerable