Browse all 8 CVE security advisories affecting etruel. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Etruel provides enterprise software solutions for supply chain management and logistics operations. Historically, its products have been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, accounting for its eight recorded CVEs. The software's complex integrations and third-party dependencies have frequently introduced security weaknesses. While no major public security incidents have been documented, the consistent pattern of vulnerabilities suggests ongoing challenges in secure coding practices. Organizations implementing Etruel solutions should prioritize regular patching and thorough vulnerability assessments to mitigate potential risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-11917 | WPeMatico RSS Feed Fetcher <= 2.8.11 - Authenticated (Subscriber+) Server-Side Request Forgery via wpematico_test_feed — WPeMatico RSS Feed FetcherCWE-918 | 6.4 | Medium | 2025-11-05 |
| CVE-2025-49922 | WordPress WPeMatico RSS Feed Fetcher plugin <= 2.8.3 - Broken Access Control vulnerability — WPeMatico RSS Feed FetcherCWE-862 | 4.3 | Medium | 2025-10-22 |
| CVE-2025-57937 | WordPress WPeMatico RSS Feed Fetcher Plugin <= 2.8.10 - Sensitive Data Exposure Vulnerability — WPeMatico RSS Feed FetcherCWE-497 | 4.3 | Medium | 2025-09-22 |
| CVE-2025-8103 | WPeMatico RSS Feed Fetcher <= 2.8.7 - Cross-Site Request Forgery to Plugin Deactivation via handle_feedback_submission Function — WPeMatico RSS Feed FetcherCWE-352 | 4.3 | Medium | 2025-07-26 |
This page lists every published CVE security advisory associated with etruel. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.