Browse all 3 CVE security advisories affecting FAKTOR VIER. AI-powered Chinese analysis, POCs, and references for each vulnerability.
FAKTOR VIER develops enterprise software solutions for business process management and workflow automation. Historically, their products have been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues. The company has three CVEs on record, primarily affecting input validation and access control mechanisms. While no major public security incidents have been documented, their vulnerability history suggests consistent weaknesses in sanitizing user inputs and implementing proper authentication controls. FAKTOR VIER's software typically requires robust hardening to mitigate these recurring security risks in enterprise environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-58617 | WordPress F4 Media Taxonomies Plugin <= 1.1.4 - Broken Access Control Vulnerability — F4 Media TaxonomiesCWE-862 | 4.3 | Medium | 2025-09-03 |
| CVE-2025-22499 | WordPress F4 Post Tree Plugin <= 1.1.18 - Reflected Cross Site Scripting (XSS) vulnerability — F4 Post TreeCWE-79 | 7.1 | High | 2025-01-13 |
| CVE-2024-31925 | WordPress F4 Improvements plugin <= 1.8.0 - Cross Site Scripting (XSS) vulnerability — F4 ImprovementsCWE-79 | 5.9 | Medium | 2024-04-11 |
This page lists every published CVE security advisory associated with FAKTOR VIER. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.