Vulnerabilities and security researches forsearchpro searchpro
Direction: ascendingBerqWP – Core Web Vitals & Speed Optimization Using Cloud # CVE-2024-37942
- CVE, Research URL
- Home page URL
-
Security reports for BerqWP – Core Web Vitals & Speed Optimization Using Cloud
- Date
- Jul 22, 2024
- Research Description
- Server-Side Request Forgery (SSRF) vulnerability in Berqier Ltd BerqWP.This issue affects BerqWP: from n/a through 1.7.5.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
BerqWP – Core Web Vitals & Speed Optimization Using Cloud # CVE-2024-43160
- CVE, Research URL
- Home page URL
-
Security reports for BerqWP – Core Web Vitals & Speed Optimization Using Cloud
- Date
- Aug 13, 2024
- Research Description
- Unrestricted Upload of File with Dangerous Type vulnerability in BerqWP allows Code Injection.This issue affects BerqWP: from n/a through 1.7.6.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
BerqWP – Core Web Vitals & Speed Optimization Using Cloud # CVE-2024-9344
- CVE, Research URL
- Home page URL
-
Security reports for BerqWP – Core Web Vitals & Speed Optimization Using Cloud
- Date
- Oct 02, 2024
- Research Description
- The BerqWP – Automated All-In-One PageSpeed Optimization Plugin for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'url' parameter in all versions up to, and including, 2.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
BerqWP – Core Web Vitals & Speed Optimization Using Cloud # CVE-2025-7443
- CVE, Research URL
- Home page URL
-
Security reports for BerqWP – Core Web Vitals & Speed Optimization Using Cloud
- Date
- Aug 01, 2025
- Research Description
- The BerqWP – Automated All-In-One Page Speed Optimization for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the store_javascript_cache.php file in all versions up to, and including, 2.2.42. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable