Browse all 3 CVE security advisories affecting peterschulznl. AI-powered Chinese analysis, POCs, and references for each vulnerability.
peterschulznl is a security researcher focused on identifying vulnerabilities in web applications and software systems. Their core use case involves discovering and reporting security flaws to improve software safety. Historically, peterschulznl has commonly found remote code execution (RCE), cross-site scripting (XSS), and privilege escalation vulnerabilities across various platforms. Their contributions include three CVEs, demonstrating consistent engagement with vulnerability disclosure. While no major public security incidents are directly linked to peterschulznl, their work highlights ongoing risks in application security. The researcher's findings emphasize the need for robust input validation, secure coding practices, and proper access controls to prevent exploitation of common vulnerability classes.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-0557 | WP Data Access <= 5.5.63 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'wpda_app' Shortcode — WP Data Access – App Builder for Tables, Forms, Charts, Maps & DashboardsCWE-79 | 6.4 | Medium | 2026-02-14 |
| CVE-2024-12428 | WP Data Access – App, Table, Form and Chart Builder plugin <= 5.5.22 - Unauthenticated SQL Injection — WP Data Access – App Builder for Tables, Forms, Charts, Maps & DashboardsCWE-89 | 7.5 | High | 2024-12-25 |
| CVE-2023-1874 | WP Data Access <= 5.3.7 - Authenticated (Subscriber+) Privilege Escalation — WP Data Access – App Builder for Tables, Forms, Charts, Maps & DashboardsCWE-266 | 7.5 | High | 2023-04-12 |
This page lists every published CVE security advisory associated with peterschulznl. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.