Browse all 4 CVE security advisories affecting rico-macchi. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Rico-macchi primarily develops enterprise software solutions with a focus on workflow automation and document management systems. Historically, the product has been associated with multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, often stemming from insufficient input validation and improper access controls. While no major public security incidents have been documented, the four CVEs attributed to the product highlight consistent weaknesses in authentication mechanisms and secure coding practices. The software's integration with multiple third-party services increases its attack surface, making regular security assessments essential for organizations implementing this solution.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-10175 | WP Links Page <= 4.9.6 - Authenticated (Subscriber+) SQL Injection — WP Links PageCWE-89 | 6.5 | Medium | 2025-10-11 |
| CVE-2025-9975 | WP Scraper <= 5.8.1 - Authenticated (Administrator+) Server-Side Request Forgery — WP ScraperCWE-918 | 6.8 | Medium | 2025-10-11 |
| CVE-2024-6465 | WP Links Page <= 4.9.5 - Missing Authorization to Authenticated (Subscriber+) Limited Image Update — WP Links PageCWE-862 | 4.3 | Medium | 2024-07-13 |
| CVE-2024-3663 | WP Scraper <= 5.7 - Missing Authorization to Arbitrary Page/Post Creation — WP ScraperCWE-862 | 4.3 | Medium | 2024-05-22 |
This page lists every published CVE security advisory associated with rico-macchi. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.