Browse all 4 CVE security advisories affecting Paul Bearne. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Paul Bearne focuses on web application security research, primarily identifying vulnerabilities in enterprise software. His CVE history reveals a pattern of exposure in remote code execution, cross-site scripting, and privilege escalation flaws, often in content management and e-commerce platforms. His work has highlighted critical weaknesses in popular systems, with several findings resulting in high-severity advisories. Bearne's research consistently emphasizes input validation and access control issues, contributing to improved security practices in affected products. His contributions have led to patches in widely deployed software, demonstrating practical impact on reducing attack surfaces in business-critical applications.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-39690 | WordPress Author Avatars List/Block plugin <= 2.1.25 - Broken Access Control vulnerability — Author Avatars List/BlockCWE-862 | 5.3 | Medium | 2026-04-08 |
| CVE-2025-22804 | WordPress Author Avatars List/Block plugin <= 2.1.23 - Stored Cross Site Scripting (XSS) vulnerability — Author Avatars List/BlockCWE-79 | 6.5 | Medium | 2025-01-09 |
| CVE-2024-47370 | WordPress Author Avatars List/Block plugin <= 2.1.21 - Cross Site Scripting (XSS) vulnerability — Author Avatars List/BlockCWE-79 | 6.5 | Medium | 2024-10-05 |
| CVE-2023-49846 | WordPress Author Avatars List/Block Plugin <= 2.1.17 is vulnerable to Cross Site Scripting (XSS) — Author Avatars List/BlockCWE-79 | 6.5 | Medium | 2023-12-14 |
This page lists every published CVE security advisory associated with Paul Bearne. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.