Browse all 4 CVE security advisories affecting Gfazioli. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Gfazioli develops security tools and research, focusing on vulnerability analysis and penetration testing. Historically, their work has commonly exposed remote code execution, cross-site scripting, and privilege escalation vulnerabilities across various applications. While no major public security incidents directly involving gfazioli have been documented, their research has contributed to identifying critical flaws in multiple systems. The individual maintains a CVE record with four entries, demonstrating consistent engagement with security research. Their approach emphasizes practical vulnerability discovery and remediation, contributing to the broader security community through documented findings and analysis of common vulnerability patterns in software and web applications.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-25012 | WordPress WP Bannerize Pro plugin <= 1.11.0 - Broken Access Control vulnerability — WP Bannerize ProCWE-862 | 5.3 | Medium | 2026-02-03 |
| CVE-2025-58615 | WordPress WP Bannerize Pro Plugin <= 1.10.0 - Server Side Request Forgery (SSRF) Vulnerability — WP Bannerize ProCWE-918 | 4.4 | Medium | 2025-09-03 |
| CVE-2023-48775 | WordPress WP CleanFix plugin <= 5.6.2 - Broken Access Control vulnerability — WP CleanfixCWE-862 | 5.3 | Medium | 2024-12-31 |
| CVE-2024-7388 | WP Bannerize Pro <= 1.9.0 - Authenticated (Editor+) Stored Cross-Site Scripting — WP Bannerize ProCWE-79 | 4.0 | Medium | 2024-08-13 |
This page lists every published CVE security advisory associated with Gfazioli. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.