Browse all 4 CVE security advisories affecting Repuso. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Repuso is a software platform primarily used for content management and workflow automation in enterprise environments. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, as evidenced by its four recorded CVEs. The platform's security posture has been characterized by insufficient input validation and inadequate access controls in previous versions. While no major public security incidents have been widely documented, the consistent pattern of vulnerabilities in its history suggests a need for rigorous security hardening and regular patch management by organizations implementing Repuso solutions.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-62071 | WordPress Social proof testimonials and reviews by Repuso plugin <= 5.29 - Broken Access Control vulnerability — Social proof testimonials and reviews by RepusoCWE-862 | 4.3 | Medium | 2025-10-22 |
| CVE-2025-31886 | WordPress Social proof testimonials and reviews by Repuso plugin <= 5.21 - Broken Access Control vulnerability — Social proof testimonials and reviews by RepusoCWE-862 | 4.3 | Medium | 2025-04-01 |
| CVE-2023-46196 | WordPress Social proof testimonials and reviews by Repuso plugin <= 4.97 - Broken Access Control vulnerability — Social proof testimonials and reviews by RepusoCWE-862 | 4.3 | Medium | 2025-01-02 |
| CVE-2023-45048 | WordPress Social proof testimonials and reviews by Repuso Plugin <= 5.00 is vulnerable to Cross Site Request Forgery (CSRF) — Social proof testimonials and reviews by RepusoCWE-352 | 5.4 | Medium | 2023-10-12 |
This page lists every published CVE security advisory associated with Repuso. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.