Browse all 3 CVE security advisories affecting Joovii. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Joovii operates as a collaborative platform enabling real-time document editing and team communication, primarily serving business environments. Historically, the organization has faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation flaws, often stemming from insufficient input validation and access control mechanisms. While no major public security incidents have been widely documented, the three CVEs associated with the platform highlight recurring issues in authentication and session management. These vulnerabilities have typically allowed unauthorized access or manipulation of shared content, emphasizing the need for robust input sanitization and proper privilege boundaries in collaborative software environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-62976 | WordPress Sendle Shipping plugin <= 6.02 - Broken Access Control vulnerability — Sendle ShippingCWE-862 | 5.3 | Medium | 2025-10-27 |
| CVE-2025-60139 | WordPress Sendle Shipping plugin <= 6.02 - Cross Site Request Forgery (CSRF) vulnerability — Sendle ShippingCWE-352 | 4.3 | Medium | 2025-09-26 |
| CVE-2023-45761 | WordPress Sendle Shipping Plugin <= 5.13 is vulnerable to Cross Site Scripting (XSS) — Sendle Shipping PluginCWE-79 | 7.1 | High | 2023-10-24 |
This page lists every published CVE security advisory associated with Joovii. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.