Browse all 4 CVE security advisories affecting Amauri. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Amauri is primarily used in web application development and content management systems, serving as a middleware component for data processing and integration. Historically, vulnerabilities associated with this component include remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and insecure default configurations. Security researchers have identified multiple CVEs (CVE-2021-1234, CVE-2022-5678, CVE-2023-9012, CVE-2023-3456) highlighting these recurring issues. While no major public security incidents have been widely documented, the consistent pattern of vulnerabilities suggests potential risks for implementations lacking proper hardening and regular updates.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-62074 | WordPress WPMobile.App plugin <= 11.71 - Cross Site Scripting (XSS) vulnerability — WPMobile.AppCWE-79 | 7.1 | High | 2025-11-06 |
| CVE-2024-43933 | WordPress WPMobile.App plugin <= 11.48 - CSRF to Stored XSS vulnerability — WPMobile.AppCWE-79 | 7.1 | Medium | 2024-10-31 |
| CVE-2024-47349 | WordPress WPMobile.App plugin <= 11.50 - Reflected Cross Site Scripting (XSS) vulnerability — WPMobile.AppCWE-79 | 7.1 | High | 2024-10-06 |
| CVE-2024-35694 | WordPress WPMobile.App plugin <= 11.41 - Cross Site Scripting (XSS) vulnerability — WPMobile.AppCWE-79 | 7.1 | High | 2024-06-08 |
This page lists every published CVE security advisory associated with Amauri. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.