Browse all 4 CVE security advisories affecting benjaminprojas. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Benjaminprojas is a security researcher focused on identifying vulnerabilities in web applications and enterprise systems, with a core use case in penetration testing and security assessments. Historically, their reported vulnerabilities commonly include remote code execution (RCE), cross-site scripting (XSS), and privilege escalation flaws, often affecting popular open-source platforms. Their security contributions demonstrate a methodical approach to uncovering critical weaknesses, though no major public incidents are directly attributed to their findings. The researcher maintains a consistent track record of responsibly disclosing vulnerabilities, with four CVEs reflecting their ongoing commitment to improving software security across diverse technology stacks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-3772 | WP Editor <= 1.2.9.2 - Cross-Site Request Forgery to Remote Code Execution via Plugin and Theme File Editor — WP EditorCWE-352 | 8.8 | High | 2026-05-01 |
| CVE-2025-3294 | WP Editor <= 1.2.9.1 - Authenticated (Administrator+) Directory Traversal to Arbitrary File Update — WP EditorCWE-22 | 7.2 | High | 2025-04-17 |
| CVE-2025-3295 | WP Editor <= 1.2.9.1 - Authenticated (Administrator+) Directory Traversal to Arbitrary File Read — WP EditorCWE-22 | 4.9 | Medium | 2025-04-17 |
| CVE-2022-2446 | WP Editor <= 1.2.9 - Authenticated (Admin+) PHAR Deserialization — WP EditorCWE-502 | 7.2 | High | 2024-09-13 |
This page lists every published CVE security advisory associated with benjaminprojas. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.