cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches foryml-for-yandex-market yml-for-yandex-market

Direction: descending
Mar 30, 2026

YML for Yandex Market # CVE-2026-32567

CVE, Research URL

CVE-2026-32567

Application

YML for Yandex Market

Date
Mar 25, 2026
Research Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in icopydoc YML for Yandex Market yml-for-yandex-market allows Path Traversal.This issue affects YML for Yandex Market: from n/a through < 5.3.0.
Affected versions
max 5.3.0.
Status
vulnerable
Oct 03, 2024

YML for Yandex Market # CVE-2024-9378

CVE, Research URL

CVE-2024-9378

Application

YML for Yandex Market

Date
Oct 02, 2024
Research Description
The YML for Yandex Market plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 4.7.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
max 4.7.3.
Status
vulnerable
Jun 07, 2024

YML for Yandex Market # CVE-2023-30473

CVE, Research URL

CVE-2023-30473

Application

YML for Yandex Market

Date
Aug 16, 2023
Research Description
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Maxim Glazunov YML for Yandex Market plugin <= 3.10.7 versions.
Affected versions
max 3.10.8.
Status
vulnerable

YML for Yandex Market # CVE-2024-1365

CVE, Research URL

CVE-2024-1365

Application

YML for Yandex Market

Date
Mar 13, 2024
Research Description
The YML for Yandex Market plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the feed_id parameter in all versions up to, and including, 4.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
max 4.2.4.
Status
vulnerable

YML for Yandex Market # 6c7207205278db44e931833e035d6aa7a4e66b3a

Application

YML for Yandex Market

Date
Apr 17, 2023
Research Description
YML for Yandex Market [yml-for-yandex-market] < 3.10.8 Yml for Yandex Market <= 3.10.7 - Reflected Cross-Site Scripting The Yml for Yandex Market plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in versions up to, and including, 3.10.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected versions
max 3.10.8.
Status
vulnerable