Browse all 4 CVE security advisories affecting Mark O'Donnell. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Mark O'Donnell focuses on web application security research, identifying vulnerabilities in enterprise software and open-source projects. His work primarily centers on remote code execution and cross-site scripting flaws, with a secondary focus on privilege escalation vulnerabilities. O'Donnell has contributed to the disclosure of four CVEs, highlighting consistent patterns in input validation and authentication bypass issues. His research often targets widely used content management systems and e-commerce platforms, emphasizing practical exploitation techniques. While no major public incidents are directly attributed to his findings, his CVE contributions have prompted security updates in multiple vendor products, demonstrating real-world impact on application security postures.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-62944 | WordPress MSTW CSV EXPORTER plugin <= 1.4 - Broken Access Control vulnerability — MSTW CSV EXPORTERCWE-862 | 5.3 | Medium | 2025-10-27 |
| CVE-2025-58852 | WordPress MSTW League Manager Plugin <= 2.10 - Cross Site Request Forgery (CSRF) Vulnerability — MSTW League ManagerCWE-352 | 7.1 | High | 2025-09-05 |
| CVE-2025-31905 | WordPress Team Rosters Plugin <= 4.7 - Reflected Cross Site Scripting (XSS) vulnerability — Team RostersCWE-79 | 7.1 | High | 2025-04-03 |
| CVE-2024-52439 | WordPress Team Rosters plugin <= 4.8.2 - PHP Object Injection vulnerability — Team RostersCWE-502 | 9.8 | Critical | 2024-11-20 |
This page lists every published CVE security advisory associated with Mark O'Donnell. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.