cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches formesmerize-companion mesmerize-companion

Direction: descending
Feb 27, 2026

Mesmerize Companion # CVE-2025-12027

CVE, Research URL

CVE-2025-12027

Application

Mesmerize Companion

Date
Feb 19, 2026
Research Description
The Mesmerize Companion plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the "openPageInCustomizer" and "openPageInDefaultEditor" functions in all versions up to, and including, 1.6.158. This makes it possible for authenticated attackers - with subscriber level access and above, on websites with the Mesmerize theme activated - to mark arbitrary pages as maintainable, wrap their content in custom sections, change page template metadata, and toggle the default editor flag without proper authorization.
Affected versions
max 1.6.162.
Status
vulnerable
Jun 07, 2024

Mesmerize Companion # CVE-2024-3494

CVE, Research URL

CVE-2024-3494

Application

Mesmerize Companion

Date
May 08, 2024
Research Description
The Mesmerize Companion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mesmerize_contact_form' shortcode in all versions up to, and including, 1.6.148 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected versions
max 1.6.149.
Status
vulnerable

Mesmerize Companion # CVE-2022-4481

CVE, Research URL

CVE-2022-4481

Application

Mesmerize Companion

Date
Jan 16, 2023
Research Description
The Mesmerize Companion WordPress plugin before 1.6.135 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
Affected versions
max 1.6.135.
Status
vulnerable