Browse all 3 CVE security advisories affecting silkalns. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Silkalns operates as a software development company focusing on enterprise applications and custom solutions. Historically, its products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, with three CVEs documented. Security assessments indicate consistent weaknesses in input validation and access control mechanisms. While no major public security incidents have been reported, the recurring nature of these vulnerabilities suggests potential systemic issues in secure coding practices. Organizations using Silkalns software should implement strict input sanitization and regular security updates to mitigate risks associated with these common flaw patterns.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-13423 | Sparkling <= 2.4.9 - Missing Authorization to Unauthenticated Arbitrary Plugin Activation/Deactivation — SparklingCWE-862 | 5.3 | Medium | 2025-03-05 |
| CVE-2022-45849 | WordPress Activello Theme <= 1.4.4 is vulnerable to Cross Site Scripting (XSS) — ActivelloCWE-79 | 5.4 | Medium | 2023-04-16 |
| CVE-2022-45358 | WordPress Activello Theme <= 1.4.4 is vulnerable to Cross Site Scripting (XSS) — ActivelloCWE-79 | 5.4 | Medium | 2023-04-13 |
This page lists every published CVE security advisory associated with silkalns. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.