Browse all 13 CVE security advisories affecting azzaroco. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Azzaroco is a software platform primarily used for enterprise content management and workflow automation. Historically, it has been vulnerable to multiple remote code execution flaws, cross-site scripting attacks, and privilege escalation issues, accounting for its 13 recorded CVEs. The platform's complex architecture and extensive third-party integrations have contributed to persistent security challenges. While no major public incidents have been widely documented, the consistent pattern of vulnerabilities suggests ongoing risks for organizations relying on this system, particularly in environments where unpatched instances are exposed to public networks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-56069 | WordPress WP SuperBackup plugin <= 2.3.3 - Reflected Cross Site Scripting (XSS) vulnerability — WP SuperBackupCWE-79 | 7.1 | High | 2025-01-02 |
| CVE-2024-56070 | WordPress WP SuperBackup plugin <= 2.3.3 - Multiple Subscriber+ Broken Access Control vulnerabilities — WP SuperBackupCWE-862 | 7.4 | High | 2024-12-31 |
| CVE-2024-56064 | WordPress WP SuperBackup plugin <= 2.3.3 - Unauthenticated Arbitrary File Upload vulnerability — WP SuperBackupCWE-434 | 10.0 | Critical | 2024-12-31 |
| CVE-2024-56068 | WordPress WP SuperBackup plugin <= 2.3.3 - Subscriber+ PHP Object Injection vulnerability — WP SuperBackupCWE-502 | 7.5 | High | 2024-12-31 |
| CVE-2024-56067 | WordPress WP SuperBackup plugin <= 2.3.3 - Unauthenticated Backup File Download Vulnerability — WP SuperBackupCWE-862 | 7.5 | High | 2024-12-31 |
This page lists every published CVE security advisory associated with azzaroco. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.