Browse all 3 CVE security advisories affecting AWESOME TOGI. AI-powered Chinese analysis, POCs, and references for each vulnerability.
AWESOME TOGI is a web application framework primarily used for building dynamic content management systems. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and insecure default configurations. The framework's modular architecture introduces additional attack surfaces through third-party plugins. While no major public security incidents have been documented, its three CVE records indicate persistent security challenges that require regular patching and secure implementation practices. Developers using AWESOME TOGI should prioritize input sanitization and principle of least privilege configurations to mitigate common exploitation vectors.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-29173 | WordPress Product Category Tree plugin <= 2.5 - Broken Access Control vulnerability — Product Category TreeCWE-862 | 5.3 | Medium | 2024-12-09 |
| CVE-2023-46151 | WordPress Product Category Tree Plugin <= 2.5 is vulnerable to Cross Site Request Forgery (CSRF) — Product Category TreeCWE-352 | 4.3 | Medium | 2023-10-24 |
| CVE-2023-45054 | WordPress Product Category Tree Plugin <= 2.5 is vulnerable to Cross Site Scripting (XSS) — Product Category TreeCWE-79 | 7.1 | High | 2023-10-18 |
This page lists every published CVE security advisory associated with AWESOME TOGI. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.