Browse all 32 CVE security advisories affecting e-plugins. AI-powered Chinese analysis, POCs, and references for each vulnerability.
e-plugins function as a comprehensive suite of WordPress extensions designed to enhance website functionality, including security, SEO, and performance optimization. With thirty-two recorded Common Vulnerabilities and Exposures (CVEs), the software has historically been susceptible to critical security flaws. These vulnerabilities predominantly involve Remote Code Execution (RCE), Cross-Site Scripting (XSS), and privilege escalation, often stemming from insufficient input validation and improper access controls within specific modules. While the platform offers robust features for site management, its attack surface has attracted significant attention from threat actors seeking to compromise underlying server infrastructure. Security audits highlight that many incidents result from outdated versions lacking recent patches. Consequently, administrators must prioritize regular updates and strict permission management to mitigate risks associated with these known weaknesses, ensuring the integrity of the hosted environment against potential exploitation.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-69293 | WordPress Final User plugin <= 1.2.5 - Privilege Escalation vulnerability — Final UserCWE-266 | 8.8 | High | 2026-01-22 |
| CVE-2025-69187 | WordPress Final User plugin <= 1.2.5 - Broken Access Control vulnerability — Final UserCWE-862 | 7.3 | High | 2026-01-22 |
This page lists every published CVE security advisory associated with e-plugins. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.