Browse all 3 CVE security advisories affecting rilwis. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Rilwis is a WordPress plugin primarily used for image optimization and management, with three documented CVEs. Historically, it has been susceptible to multiple vulnerability classes, including stored cross-site scripting (XSS) and remote code execution (RCE), often stemming from insufficient input validation and improper file handling. The plugin's security posture has been compromised by issues like unauthenticated file uploads and inadequate sanitization, allowing attackers to execute malicious code or escalate privileges. While no major public incidents have been widely reported, the consistent pattern of vulnerabilities in a widely-used plugin presents a significant risk to unpatched WordPress installations.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-4611 | Slim SEO <= 4.5.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via slim_seo_breadcrumbs Shortcode — Slim SEO – A Fast & Automated SEO Plugin For WordPressCWE-79 | 6.4 | Medium | 2025-05-21 |
| CVE-2022-29442 | Private Messages For WordPress <= 2.1.10 - Authenticated Stored Cross-Site Scripting (XSS) vulnerability — Private Messages For WordPress (WordPress plugin)CWE-79 | 5.4 | Medium | 2022-06-15 |
| CVE-2022-29441 | WordPress Private Messages For WordPress plugin <= 2.1.10 - Sending Messages via Cross-Site Request Forgery (CSRF) vulnerability — Private Messages For WordPress (WordPress plugin)CWE-352 | 4.3 | Medium | 2022-06-15 |
This page lists every published CVE security advisory associated with rilwis. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.