Vulnerabilities and security researches forseraphinite-accelerator seraphinite-accelerator
Direction: ascendingJun 07, 2024
Seraphinite Accelerator # CVE-2023-5610
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 21, 2023
- Research Description
- The Seraphinite Accelerator WordPress plugin before 2.2.29 does not validate the URL to redirect any authenticated user to, leading to an arbitrary redirect
- Affected versions
-
max 2.20.32.
- Status
-
vulnerable
Seraphinite Accelerator # CVE-2023-5609
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 21, 2023
- Research Description
- The Seraphinite Accelerator WordPress plugin before 2.2.29 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
- Affected versions
-
max 2.20.29.
- Status
-
vulnerable
Seraphinite Accelerator # CVE-2024-1568
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 28, 2024
- Research Description
- The Seraphinite Accelerator plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.20.52 via the OnAdminApi_HtmlCheck function. This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
- Affected versions
-
max 2.21.
- Status
-
vulnerable
Seraphinite Accelerator # CVE-2023-49740
- CVE, Research URL
- Home page URL
- Application
- Date
- Dec 14, 2023
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Seraphinite Solutions Seraphinite Accelerator allows Reflected XSS.This issue affects Seraphinite Accelerator: from n/a through 2.20.28.
- Affected versions
-
max 2.20.29.
- Status
-
vulnerable
Seraphinite Accelerator # CVE-2023-5611
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 27, 2023
- Research Description
- The Seraphinite Accelerator WordPress plugin before 2.20.32 does not have authorisation and CSRF checks when resetting and importing its settings, allowing unauthenticated users to reset them
- Affected versions
-
max 2.20.32.
- Status
-
vulnerable
Seraphinite Accelerator # CVE-2024-22138
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 28, 2024
- Research Description
- Insertion of Sensitive Information into Log File vulnerability in Seraphinite Solutions Seraphinite Accelerator.This issue affects Seraphinite Accelerator: from n/a through 2.20.47.
- Affected versions
-
max 2.20.48.
- Status
-
vulnerable
Dec 23, 2024
Seraphinite Accelerator # CVE-2024-54222
- CVE, Research URL
- Home page URL
- Application
- Date
- Feb 20, 2026
- Research Description
- Missing Authorization vulnerability in Seraphinite Solutions Seraphinite Accelerator seraphinite-accelerator allows Retrieve Embedded Sensitive Data.This issue affects Seraphinite Accelerator: from n/a through <= 2.22.15.
- Affected versions
-
max 2.22.16.
- Status
-
vulnerable
Apr 15, 2026
Seraphinite Accelerator # CVE-2026-3058
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 04, 2026
- Research Description
- The Seraphinite Accelerator plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.28.14 via the `seraph_accel_api` AJAX action with `fn=GetData`. This is due to the `OnAdminApi_GetData()` function not performing any capability checks. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive operational data including cache status, scheduled task information, and external database state.
- Affected versions
-
max 2.28.15.
- Status
-
vulnerable
Seraphinite Accelerator # CVE-2026-3056
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 04, 2026
- Research Description
- The Seraphinite Accelerator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `seraph_accel_api` AJAX action with `fn=LogClear` in all versions up to, and including, 2.28.14. This makes it possible for authenticated attackers, with Subscriber-level access and above, to clear the plugin's debug/operational logs.
- Affected versions
-
max 2.28.15.
- Status
-
vulnerable