Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

gioni — Vulnerabilities & Security Advisories 4

Browse all 4 CVE security advisories affecting gioni. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Gioni is a web-based application primarily used for content management and collaboration. Historically, it has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues. The application's security posture has been compromised through insufficient input validation and improper access controls. While no major public incidents have been widely documented, its four recorded CVEs highlight consistent security weaknesses in authentication mechanisms and data handling. These vulnerabilities have allowed attackers to execute arbitrary code, steal session cookies, and bypass security restrictions, making proper configuration and timely updates critical for secure deployment.

CVE IDTitleCVSSSeverityPublished
CVE-2025-53298 WordPress Plugin Inspector plugin <= 1.5 - Arbitrary File Download Vulnerability — Plugin InspectorCWE-22 4.9 Medium2025-06-27
CVE-2022-4100 WP Cerber Security <= 9.4 - IP Protection Bypass — WP Cerber Security, Anti-spam & Malware ScanCWE-693 5.3 Medium2024-08-31
CVE-2022-4712 WP Cerber Security <= 9.1 - Unauthenticated Stored Cross-Site Scripting — WP Cerber Security, Anti-spam & Malware ScanCWE-79 7.2 High2023-10-20
CVE-2022-2939 WP Cerber Security <= 9.0 - User Enumeration Bypass — WP Cerber Security, Anti-spam & Malware ScanCWE-200 5.3 Medium2022-09-06

This page lists every published CVE security advisory associated with gioni. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.