Vulnerabilities and security researches forhot-random-image hot-random-image
Direction: descendingJun 01, 2025
Hot Random Image # CVE-2025-4419
- CVE, Research URL
- Home page URL
- Application
- Date
- May 22, 2025
- Research Description
- The Hot Random Image plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.9.2 via the 'path' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to access arbitrary images with allowed extensions, outside of the originally intended directory.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Hot Random Image # CVE-2025-4405
- CVE, Research URL
- Home page URL
- Application
- Date
- May 22, 2025
- Research Description
- The Hot Random Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ parameter in all versions up to, and including, 1.9.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jun 07, 2024
Hot Random Image # CVE-2024-29796
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 27, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hot Themes Hot Random Image allows Stored XSS.This issue affects Hot Random Image: from n/a through 1.8.1.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable