Browse all 4 CVE security advisories affecting samsk. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Samsk operates as a web application framework primarily used for building content management systems and e-commerce platforms. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and insecure default configurations. The framework's modular architecture has introduced additional attack surfaces through third-party plugins. While no major public security incidents have been widely documented, its consistent appearance in CVE reports suggests ongoing challenges in secure coding practices. Developers implementing Samsk should prioritize timely updates and rigorous input sanitization to mitigate common exploitation vectors.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-53292 | WordPress WP DataTable plugin <= 0.2.7 - Cross Site Scripting (XSS) Vulnerability — WP DataTableCWE-79 | 6.5 | Medium | 2025-06-27 |
| CVE-2025-30594 | WordPress Include URL plugin <= 0.3.5 Arbitrary File Download Vulnerability — Include URLCWE-22 | 6.5 | Medium | 2025-04-01 |
| CVE-2025-30593 | WordPress Include URL plugin <= 0.3.5 Cross Site Scripting (XSS) Vulnerability — Include URLCWE-79 | 6.5 | Medium | 2025-03-24 |
| CVE-2024-13566 | WP DataTable <= 0.2.6 - Authenticated (Contributor+) Stored Cross-Site Scripting via id Parameter — WP DataTableCWE-79 | 6.4 | Medium | 2025-01-31 |
This page lists every published CVE security advisory associated with samsk. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.