Browse all 4 CVE security advisories affecting vertim. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Vertim operates in industrial automation, providing control systems for manufacturing and infrastructure. Historically, its products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and insecure default configurations. The four recorded CVEs highlight these recurring issues, with some allowing unauthorized system access or disruption of critical operations. Security assessments frequently identify weak authentication mechanisms and inadequate patch management as systemic concerns. While no major public incidents have been widely documented, the consistent pattern of vulnerabilities suggests significant exposure risks for environments relying on Vertim's systems without robust security hardening and ongoing maintenance.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-67970 | WordPress Schedula plugin <= 1.0 - Broken Access Control vulnerability — SchedulaCWE-862 | 5.9 | Medium | 2026-02-20 |
| CVE-2025-54679 | WordPress Neon Channel Product Customizer Free Plugin <= 2.0 - Arbitrary Content Deletion Vulnerability — Neon Channel Product Customizer FreeCWE-862 | 7.5 | High | 2025-08-14 |
| CVE-2025-32565 | WordPress Neon Product Designer Plugin <= 2.2.0 - Unauthenticated SQL Injection vulnerability — Neon Product DesignerCWE-89 | 9.3 | Critical | 2025-04-11 |
| CVE-2025-22799 | WordPress Neon Product Designer Plugin <= 2.2.0 - SQL Injection vulnerability — Neon Product DesignerCWE-89 | 8.5 | High | 2025-01-15 |
This page lists every published CVE security advisory associated with vertim. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.