Browse all 14 CVE security advisories affecting ajay. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Ajay is primarily used for web application development and API management, serving as a middleware solution for integrating various services. Historically, Ajay has been associated with vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, with 14 CVEs documented to date. Security researchers have identified consistent issues in input validation and access control mechanisms. While no major public incidents have been widely reported, the accumulation of CVEs suggests potential risks in production environments requiring strict hardening and regular patching. Organizations implementing Ajay should prioritize security reviews and monitoring to mitigate identified weaknesses.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-7431 | Knowledge Base <= 2.3.1 - Authenticated (Administrator+) Stored Cross-Site Scripting via Plugin Slug — Knowledge BaseCWE-79 | 4.4 | Medium | 2025-07-18 |
| CVE-2025-5533 | Knowledge Base <= 2.3.0 - Authenticated (Contributor+) Stored Cross-Site Scripting — Knowledge BaseCWE-79 | 6.4 | Medium | 2025-06-06 |
| CVE-2024-51677 | WordPress Knowledge Base plugin <= 2.2.0 - Cross Site Scripting (XSS) vulnerability — Knowledge BaseCWE-79 | 6.5 | Medium | 2024-11-04 |
This page lists every published CVE security advisory associated with ajay. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.