Vulnerabilities and security researches forwp-editor wp-editor
Direction: ascendingJun 06, 2024
WP Editor # CVE-2016-10885
- CVE, Research URL
- Home page URL
- Application
- Date
- Aug 14, 2019
- Research Description
- The wp-editor plugin before 1.2.6 for WordPress has CSRF.
- Affected versions
-
max 1.2.6.
- Status
-
vulnerable
WP Editor # CVE-2016-10886
- CVE, Research URL
- Home page URL
- Application
- Date
- Aug 14, 2019
- Research Description
- The wp-editor plugin before 1.2.6 for WordPress has incorrect permissions.
- Affected versions
-
max 1.2.6.
- Status
-
vulnerable
WP Editor # CVE-2016-10877
- CVE, Research URL
- Home page URL
- Application
- Date
- Aug 12, 2019
- Research Description
- The wp-editor plugin before 1.2.6.3 for WordPress has multiple XSS issues.
- Affected versions
-
max 1.2.6.
- Status
-
vulnerable
WP Editor # CVE-2024-24700
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 27, 2024
- Research Description
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Benjamin Rojas WP Editor allows Reflected XSS.This issue affects WP Editor: from n/a through 1.2.8.
- Affected versions
-
max 1.2.9.
- Status
-
vulnerable
WP Editor # CVE-2024-25591
- CVE, Research URL
- Home page URL
- Application
- Date
- Mar 17, 2024
- Research Description
- Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Benjamin Rojas WP Editor.This issue affects WP Editor: from n/a through 1.2.7.
- Affected versions
-
max 1.2.8.
- Status
-
vulnerable
Jun 10, 2024
WP Editor # CVE-2021-24151
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 16, 2024
- Research Description
- The WP Editor WordPress plugin before 1.2.7 did not sanitise or validate its setting fields leading to an authenticated (admin+) blind SQL injection issue via an arbitrary parameter when making a request to save the settings.
- Affected versions
-
max 1.2.7.
- Status
-
vulnerable
Sep 14, 2024
WP Editor # CVE-2022-2446
- CVE, Research URL
- Home page URL
- Application
- Date
- Sep 13, 2024
- Research Description
- The WP Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'current_theme_root' parameter in versions up to, and including 1.2.9. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.
- Affected versions
-
max 1.2.9.1.
- Status
-
vulnerable
Apr 18, 2025
WP Editor # CVE-2025-3294
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 17, 2025
- Research Description
- The WP Editor plugin for WordPress is vulnerable to arbitrary file update due to missing file path validation in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to overwrite arbitrary files on the affected site's server which may make remote code execution possible assuming the files can be written to by the web server.
- Affected versions
-
max 1.2.9.2.
- Status
-
vulnerable
WP Editor # CVE-2025-3295
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 17, 2025
- Research Description
- The WP Editor plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to read arbitrary files on the affected site's server which may reveal sensitive information.
- Affected versions
-
max 1.2.9.2.
- Status
-
vulnerable