Browse all 3 CVE security advisories affecting upress. AI-powered Chinese analysis, POCs, and references for each vulnerability.
uPress is a content management system focused on creating and managing websites, particularly for news and publishing organizations. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and authentication flaws. The platform has recorded three CVEs, with notable security characteristics including its plugin architecture which can introduce additional attack surfaces. While no major public security incidents have been widely documented, the consistent presence of critical vulnerabilities in its history suggests a need for rigorous security hardening and regular updates for organizations utilizing this platform.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-24534 | WordPress Booter plugin <= 1.5.7 - Broken Access Control vulnerability — BooterCWE-862 | 4.3 | Medium | 2026-01-23 |
| CVE-2024-9208 | Enable Accessibility <= 1.4.1 - Reflected Cross-Site Scripting — Enable AccessibilityCWE-79 | 6.1 | Medium | 2025-01-07 |
| CVE-2023-30484 | WordPress Enable Accessibility Plugin <= 1.4 is vulnerable to Cross Site Request Forgery (CSRF) — Enable AccessibilityCWE-352 | 4.3 | Medium | 2023-05-25 |
This page lists every published CVE security advisory associated with upress. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.