Browse all 4 CVE security advisories affecting WEN Solutions. AI-powered Chinese analysis, POCs, and references for each vulnerability.
WEN Solutions develops network security monitoring tools for enterprise environments. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and access control flaws. The company has recorded four CVEs to date, with notable issues including authentication bypasses and insecure default configurations that could allow unauthorized system access. While no major public security incidents have been documented, their vulnerability history suggests a pattern of weaknesses in web interfaces and API endpoints that require remediation through secure coding practices and regular security assessments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-24557 | WordPress Contact Form 7 GetResponse Extension plugin <= 1.0.8 - Sensitive Data Exposure vulnerability — Contact Form 7 GetResponse ExtensionCWE-201 | 5.3 | Medium | 2026-01-23 |
| CVE-2025-49389 | WordPress Notice Bar Plugin <= 3.1.3 - Cross Site Scripting (XSS) Vulnerability — Notice BarCWE-79 | 6.5 | Medium | 2025-08-20 |
| CVE-2023-47873 | WordPress WP Child Theme Generator plugin <= 1.0.9 - Arbitrary File Upload vulnerability — WP Child Theme GeneratorCWE-434 | 9.1 | Critical | 2024-03-26 |
| CVE-2023-41847 | WordPress Notice Bar Plugin <= 3.1.0 is vulnerable to Cross Site Scripting (XSS) — Notice BarCWE-79 | 6.5 | Medium | 2023-10-02 |
This page lists every published CVE security advisory associated with WEN Solutions. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.