Browse all 3 CVE security advisories affecting mdalabar. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Mdalabar operates primarily as a software component for web application development, commonly used for content management and data processing. Historically, vulnerabilities associated with mdalabar include remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation and insecure default configurations. Security characteristics reveal consistent issues with improper access controls and session management. While no major public incidents have been widely documented, the three CVEs on record highlight ongoing risks in deployment environments, particularly when default configurations remain unchanged or when integration with third-party systems introduces additional attack surfaces.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-69401 | WordPress WooODT Lite plugin <= 2.5.2 - Payment Bypass Vulnerability vulnerability — WooODT LiteCWE-290 | 7.5 | High | 2026-02-20 |
| CVE-2024-13540 | WooODT Lite – Delivery & pickup date time location for WooCommerce <= 2.5.1 - Unauthenticated Full Path Dsiclosure — WooODT Lite – Delivery & pickup date time location for WooCommerceCWE-209 | 5.3 | Medium | 2025-02-18 |
| CVE-2023-47179 | WordPress WooODT Lite plugin <= 2.4.6 - Arbitrary Site Option Update vulnerability — WooODT LiteCWE-862 | 8.8 | High | 2025-01-02 |
This page lists every published CVE security advisory associated with mdalabar. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.