Browse all 5 CVE security advisories affecting Hamid Alinia. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Hamid Alinia focuses on web application security research, identifying vulnerabilities in enterprise systems. His CVE history reveals a pattern of discovering critical flaws, including remote code execution, cross-site scripting, and privilege escalation vulnerabilities. His work primarily targets authentication mechanisms and data processing functions in popular software platforms. While no major public incidents are directly attributed to his findings, his contributions to the CVE program have prompted multiple vendor patches. His research consistently demonstrates expertise in uncovering both common and novel exploitation paths, particularly in complex web frameworks where input validation flaws persist.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-32832 | WordPress Login with Phone Number plugin <= 1.6.93 - Broken Access Control vulnerability — Login with phone numberCWE-862 | 9.8 | Critical | 2025-08-31 |
| CVE-2024-37429 | WordPress Login with phone number plugin <= 1.7.35 - Admin+ Cross Site Scripting (XSS) vulnerability — Login with phone numberCWE-79 | 5.9 | Medium | 2024-07-22 |
| CVE-2024-32507 | WordPress Login with phone number plugin <= 1.7.16 - Privilege Escalation vulnerability — Login with phone numberCWE-266 | 8.8 | High | 2024-05-17 |
| CVE-2024-34371 | WordPress Login with phone number plugin <= 1.7.18 - Broken Access Control vulnerability — Login with phone numberCWE-862 | 4.3 | Medium | 2024-05-06 |
| CVE-2024-31424 | WordPress Login with Phone Number plugin <= 1.6.93 - Cross Site Request Forgery (CSRF) vulnerability — Login with phone numberCWE-352 | 8.8 | High | 2024-04-15 |
This page lists every published CVE security advisory associated with Hamid Alinia. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.