Browse all 3 CVE security advisories affecting featherplugins. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Featherplugins develops WordPress plugins primarily for enhancing website functionality and user engagement. Historically, their products have been susceptible to cross-site scripting (XSS) and remote code execution (RCE) vulnerabilities, often stemming from insufficient input validation and improper sanitization. The plugin's frequent updates and broad user base have made it a target for exploitation. While no major public security incidents have been widely reported, the three documented CVEs highlight ongoing security challenges, particularly around access control and data handling. Their codebase typically requires regular security audits to mitigate risks associated with WordPress plugin ecosystems.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-2545 | WordPress Plugin Feather Login Page 安全漏洞 — Custom Login Page | Temporary Users | Rebrand Login | Login Captcha | 8.1 | High | 2023-05-31 |
| CVE-2023-2549 | WordPress Plugin Feather Login Page Feather Login Page 跨站请求伪造漏洞 — Custom Login Page | Temporary Users | Rebrand Login | Login Captcha | 8.8 | High | 2023-05-31 |
| CVE-2023-2547 | WordPress Plugin Feather Login Page 安全漏洞 — Custom Login Page | Temporary Users | Rebrand Login | Login Captcha | 5.4 | Medium | 2023-05-31 |
This page lists every published CVE security advisory associated with featherplugins. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.