Browse all 5 CVE security advisories affecting sbouey. AI-powered Chinese analysis, POCs, and references for each vulnerability.
sbouey develops software components for web applications, with a core use case in enabling interactive frontend functionality. Historically, vulnerabilities associated with this developer have included cross-site scripting (XSS), remote code execution (RCE), and privilege escalation flaws, often stemming from improper input validation and insecure authentication mechanisms. The security record shows a pattern of issues in JavaScript libraries where insufficient sanitization of user-provided data leads to XSS, while RCE vulnerabilities typically arise from unsafe deserialization or command injection in server-side components. No major public security incidents have been documented, though the consistent presence of similar vulnerability types suggests a need for enhanced security-by-design practices in development workflows.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-58619 | WordPress Falang multilanguage Plugin <= 1.3.65 - PHP Object Injection Vulnerability — Falang multilanguageCWE-502 | 8.8 | High | 2025-11-06 |
| CVE-2025-48285 | WordPress Falang multilanguage plugin <= 1.3.61 - Cross Site Request Forgery (CSRF) Vulnerability — Falang multilanguageCWE-352 | 4.3 | Medium | 2025-05-19 |
| CVE-2024-37240 | WordPress Falang multilanguage for WordPress plugin <= 1.3.51 - Cross Site Request Forgery (CSRF) vulnerability — Falang multilanguageCWE-352 | 4.3 | Medium | 2025-01-02 |
This page lists every published CVE security advisory associated with sbouey. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.