| CVE/PSC | Application | Date | Affected versions | Description |
|---|---|---|---|---|
| Actual on: Apr 04, 2026, 23:04:47 | Entries count: 12 | |||
|
SAFE & CERTIFIED
|
Sep 02, 2024, 12:09:14 |
Min 27.2
Max 27.2
|
The “Yoast SEO” plugin, version 26.6, renowned for its comprehensive SEO capabilities, has now achieved the Plugin Security Certification (PSC) from CleanTalk, affirming its status as a secure SEO solution for WordPress sites. | |
|
vulnerable
|
Jun 07, 2024, 07:06:34 |
Min -
Max 1.4.5
|
Multiple cross-site request forgery (CSRF) vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote attackers to hijack the authentication of certain users for requests that conduct SQL injection attacks via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page. | |
|
vulnerable
|
Jun 07, 2024, 07:06:34 |
Min -
Max 17.3
|
The Yoast SEO WordPress plugin (from versions 16.7 until 17.2) discloses the full internal path of featured images in posts via the wp/v2/posts REST endpoints which could help an attacker identify other vulnerabilities or help during the exploitation of other identified vulnerabilities. | |
|
vulnerable
|
Jun 07, 2024, 07:06:34 |
Min -
Max 3.4.1
|
A Stored Cross-Site Scripting vulnerability was discovered in the Yoast SEO WordPress plugin before 3.4.1, which had built-in blacklist filters which were blacklisting Parenthesis as well as several functions such as alert but bypasses were found. | |
|
vulnerable
|
Jun 07, 2024, 07:06:34 |
Min -
Max 11.6
|
The Yoast SEO plugin before 11.6-RC5 for WordPress does not properly restrict unfiltered HTML in term descriptions. | |
|
vulnerable
|
Jun 07, 2024, 07:06:34 |
Min -
Max 9.2.0
|
A Race condition vulnerability in unzip_file in admin/import/class-import-settings.php in the Yoast SEO (wordpress-seo) plugin before 9.2.0 for WordPress allows an SEO Manager to perform command execution on the Operating System via a ZIP import. | |
|
vulnerable
|
Jun 07, 2024, 07:06:34 |
Min -
Max 5.8.0
|
Cross-site scripting (XSS) vulnerability in admin/google_search_console/class-gsc-table.php in the Yoast SEO plugin before 5.8.0 for WordPress allows remote attackers to inject arbitrary web script or HTML. | |
|
vulnerable
|
Jun 07, 2024, 07:06:34 |
Min -
Max 1.7.4
|
Multiple SQL injection vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page to wp-admin/admin.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands. | |
|
vulnerable
|
Jun 07, 2024, 07:06:34 |
Min -
Max 2.2
|
Cross-site scripting (XSS) vulnerability in js/wp-seo-metabox.js in the WordPress SEO by Yoast plugin before 2.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the post_title parameter to wp-admin/post-new.php, which is not properly handled in the snippet preview functionality. | |
|
vulnerable
|
Jun 07, 2024, 07:06:34 |
Min -
Max 21.1
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Team Yoast Yoast SEO allows Stored XSS.This issue affects Yoast SEO: from n/a through 21.0. | |
|
vulnerable
|
Jun 07, 2024, 07:06:34 |
Min -
Max 22.6
|
The Yoast SEO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URLs in all versions up to, and including, 22.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
|
vulnerable
|
Jun 07, 2024, 07:06:34 |
Min -
Max 22.7
|
The Yoast SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘display_name’ author meta in all versions up to, and including, 22.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | |