Browse all 4 CVE security advisories affecting CodeYatri. AI-powered Chinese analysis, POCs, and references for each vulnerability.
CodeYatri develops security testing tools focused on web application vulnerability detection, with a core use case of automated penetration testing. Historically, their products have commonly identified vulnerabilities including remote code execution, cross-site scripting, and privilege escalation flaws. The tool maintains a moderate CVE count of four, primarily related to input validation bypass issues in their scanning engine. While no major security incidents have been publicly documented, the tool's effectiveness varies across different web technologies, with stronger detection capabilities in common frameworks like PHP and JavaScript environments compared to less widely used platforms.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-8605 | Gutenify - Visual Site Builder Blocks & Site Templates <= 1.5.9 - Authenticated (Contributor+) Stored Cross-Site Scripting via Count Up block — Gutenify – Visual Site Builder Blocks & Site Templates.CWE-79 | 6.4 | Medium | 2025-11-18 |
| CVE-2025-53324 | WordPress Gutenify Plugin <= 1.5.7 - Cross Site Scripting (XSS) Vulnerability — GutenifyCWE-79 | 7.1 | High | 2025-11-06 |
| CVE-2025-53326 | WordPress Gutenify Plugin <= 1.5.4 - Local File Inclusion Vulnerability — GutenifyCWE-98 | 7.5 | High | 2025-08-28 |
| CVE-2025-32168 | WordPress Gutenify plugin <= 1.5.7 - Cross Site Scripting (XSS) vulnerability — GutenifyCWE-79 | 6.5 | Medium | 2025-04-04 |
This page lists every published CVE security advisory associated with CodeYatri. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.