Browse all 3 CVE security advisories affecting Jeff Sherk. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Jeff Sherk focuses on web application security research, identifying vulnerabilities in enterprise software. His CVE history primarily involves remote code execution and cross-site scripting flaws, often in content management systems. Sherk has demonstrated a consistent ability to uncover authentication bypass and privilege escalation weaknesses in widely deployed platforms. His research has led to patches in multiple high-impact products, though no major public security incidents are directly attributed to his findings. His contributions have improved security posture for organizations relying on the vulnerable systems he has analyzed.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-46201 | WordPress Auto Login New User After Registration Plugin <= 1.9.6 is vulnerable to Cross Site Request Forgery (CSRF) — Auto Login New User After RegistrationCWE-352 | 7.1 | Medium | 2023-11-13 |
| CVE-2023-46202 | WordPress Auto Login New User After Registration Plugin <= 1.9.6 is vulnerable to Cross Site Request Forgery (CSRF) — Auto Login New User After RegistrationCWE-352 | 4.3 | Medium | 2023-10-24 |
| CVE-2023-25489 | WordPress Update Theme and Plugins from Zip File Plugin <= 2.0.0 is vulnerable to Cross Site Request Forgery (CSRF) — Update Theme and Plugins from Zip FileCWE-352 | 4.3 | Medium | 2023-10-04 |
This page lists every published CVE security advisory associated with Jeff Sherk. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.