Browse all 3 CVE security advisories affecting Very Good Plugins. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Very Good Plugins develops WordPress extensions to enhance website functionality with a focus on user experience and performance. Historically, their plugins have been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, as evidenced by three recorded CVEs. These vulnerabilities often stem from insufficient input validation and improper access controls. While no major public security incidents have been documented, the consistent pattern of vulnerabilities suggests a need for more rigorous security testing in their development lifecycle. Their plugins remain popular despite these security concerns, indicating a trade-off between functionality and security for many users.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-32455 | WordPress Fatal Error Notify plugin <= 1.5.2 - Broken Access Control vulnerability — Fatal Error NotifyCWE-862 | 4.3 | Medium | 2024-04-16 |
| CVE-2021-34660 | WP Fusion Lite <= 3.37.18 Reflected Cross-Site Scripting — WP Fusion LiteCWE-79 | 6.1 | Medium | 2021-08-09 |
| CVE-2021-34661 | WP Fusion Lite <= 3.37.18 Cross-Site Request Forgery to Data Deletion — WP Fusion LiteCWE-352 | 6.1 | Medium | 2021-08-09 |
This page lists every published CVE security advisory associated with Very Good Plugins. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.