Browse all 6 CVE security advisories affecting Ruben Garcia. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Ruben Garcia specializes in web application security research, identifying vulnerabilities in enterprise systems and open-source software. His work primarily focuses on remote code execution, cross-site scripting, and privilege escalation flaws, with six CVEs attributed to his findings. Garcia has demonstrated particular expertise in identifying authentication bypass mechanisms and insecure direct object references in popular frameworks. While no major public incidents are directly linked to his research, his contributions have consistently addressed critical weaknesses in widely deployed applications. His methodology emphasizes thorough code analysis and practical exploitation testing to ensure identified vulnerabilities have real-world impact.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-32420 | WordPress GamiPress plugin <= 7.6.6 - Cross Site Request Forgery (CSRF) vulnerability — GamiPressCWE-352 | 5.4 | Medium | 2026-03-13 |
| CVE-2025-68561 | WordPress AutomatorWP plugin <= 5.2.4 - SQL Injection vulnerability — AutomatorWPCWE-89 | 7.6 | High | 2025-12-23 |
| CVE-2025-49327 | WordPress ShortLinks Pro plugin <= 1.0.7 - SQL Injection Vulnerability — ShortLinks ProCWE-89 | 7.6 | High | 2025-06-06 |
| CVE-2025-49326 | WordPress GamiPress plugin <= 7.4.5 - SQL Injection Vulnerability — GamiPressCWE-89 | 7.6 | High | 2025-06-06 |
| CVE-2025-48280 | WordPress AutomatorWP plugin <= 5.2.1.3 - SQL Injection Vulnerability — AutomatorWPCWE-89 | 7.6 | High | 2025-05-19 |
| CVE-2025-47508 | WordPress GamiPress plugin <= 7.3.7 - Local File Inclusion Vulnerability — GamiPressCWE-98 | 7.5 | High | 2025-05-07 |
This page lists every published CVE security advisory associated with Ruben Garcia. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.