Browse all 3 CVE security advisories affecting oopspam. AI-powered Chinese analysis, POCs, and references for each vulnerability.
OOPSpam is a web application primarily used for email verification and anti-spam services. Historically, it has been associated with several common vulnerability classes, including cross-site scripting (XSS) and remote code execution (RCE) vulnerabilities, as evidenced by its three recorded CVEs. The platform has faced security incidents that highlight potential weaknesses in input validation and access controls. While specific major incidents are not widely documented, the CVEs suggest ongoing challenges in maintaining secure coding practices, particularly in handling user-supplied data and preventing unauthorized execution of code within its verification systems.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-12094 | OOPSpam Anti-Spam: Spam Protection for WordPress Forms & Comments (No CAPTCHA) <= 1.2.53 - Unauthenticated IP Header Spoofing — OOPSpam Anti-Spam: Spam Protection for WordPress Forms & Comments (No CAPTCHA)CWE-693 | 5.3 | Medium | 2025-10-31 |
| CVE-2023-35913 | WordPress OOPSpam Anti-Spam Plugin <= 1.1.44 is vulnerable to Cross Site Request Forgery (CSRF) — OOPSpam Anti-SpamCWE-352 | 4.3 | Medium | 2023-07-11 |
| CVE-2023-22716 | WordPress OOPSpam Anti-Spam Plugin <= 1.1.35 is vulnerable to Cross Site Scripting (XSS) — OOPSpam Anti-SpamCWE-79 | 5.9 | Medium | 2023-03-23 |
This page lists every published CVE security advisory associated with oopspam. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.