Browse all 4 CVE security advisories affecting gioni. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Gioni is a web-based application primarily used for content management and collaboration. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues. The application's security posture has been compromised through insufficient input validation and improper access controls. While no major public incidents have been widely documented, its four recorded CVEs highlight consistent security weaknesses in authentication mechanisms and data handling. These vulnerabilities have allowed attackers to execute arbitrary code, steal session cookies, and bypass security restrictions, making proper configuration and timely updates critical for secure deployment.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-53298 | WordPress Plugin Inspector plugin <= 1.5 - Arbitrary File Download Vulnerability — Plugin InspectorCWE-22 | 4.9 | Medium | 2025-06-27 |
| CVE-2022-4100 | WP Cerber Security <= 9.4 - IP Protection Bypass — WP Cerber Security, Anti-spam & Malware ScanCWE-693 | 5.3 | Medium | 2024-08-31 |
| CVE-2022-4712 | WP Cerber Security <= 9.1 - Unauthenticated Stored Cross-Site Scripting — WP Cerber Security, Anti-spam & Malware ScanCWE-79 | 7.2 | High | 2023-10-20 |
| CVE-2022-2939 | WP Cerber Security <= 9.0 - User Enumeration Bypass — WP Cerber Security, Anti-spam & Malware ScanCWE-200 | 5.3 | Medium | 2022-09-06 |
This page lists every published CVE security advisory associated with gioni. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.