Browse all 3 CVE security advisories affecting Archetyped. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Archetyped develops enterprise software solutions for content management and workflow automation. Historically, the product has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and access control flaws. While no major public security incidents have been documented, the three CVEs on record highlight consistent patterns in insecure coding practices. The application's complex architecture and extensive integration points create multiple attack surfaces, requiring continuous security hardening. Organizations implementing Archetyped should prioritize regular patching and conduct thorough penetration testing to mitigate identified risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-32570 | WordPress Cornerstone plugin <= 0.8.0 - Reflected Cross Site Scripting (XSS) vulnerability — CornerstoneCWE-79 | 7.1 | High | 2024-04-18 |
| CVE-2024-28001 | WordPress Favicon Rotator plugin <= 1.2.10 - Reflected Cross Site Scripting (XSS) vulnerability — Favicon RotatorCWE-79 | 7.1 | High | 2024-03-28 |
| CVE-2024-28002 | WordPress Cornerstone plugin <= 0.8.0 - Reflected Cross Site Scripting (XSS) vulnerability — CornerstoneCWE-79 | 7.1 | High | 2024-03-28 |
This page lists every published CVE security advisory associated with Archetyped. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.