Browse all 3 CVE security advisories affecting AMP-MODE. AI-powered Chinese analysis, POCs, and references for each vulnerability.
AMP-MODE is a software component primarily used for application management and orchestration in enterprise environments. Historically, it has been vulnerable to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, with three CVEs currently documented. The component's complex architecture and extensive API surface have contributed to these security issues. While no major public incidents have been widely reported, the consistent pattern of vulnerabilities suggests potential risks for organizations using AMP-MODE without proper hardening. Security researchers have noted that misconfigurations could further amplify these vulnerabilities, making regular updates and input validation critical for maintaining secure deployments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-67628 | WordPress Review Disclaimer plugin <= 2.0.3 - Cross Site Scripting (XSS) vulnerability — Review DisclaimerCWE-79 | 5.9 | Medium | 2025-12-24 |
| CVE-2024-37523 | WordPress Login Logo Editor plugin <= 1.3.3 - Cross Site Scripting (XSS) vulnerability — Login Logo EditorCWE-79 | 5.9 | Medium | 2024-07-21 |
| CVE-2024-34565 | WordPress Debug Info plugin <= 1.3.10 - Cross Site Scripting (XSS) vulnerability — Debug InfoCWE-79 | 5.9 | Medium | 2024-05-08 |
This page lists every published CVE security advisory associated with AMP-MODE. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.