Browse all 4 CVE security advisories affecting virusdie. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Virusdie operates as a web hosting security platform specializing in malware removal and vulnerability scanning for web servers. The service primarily targets cleaning compromised websites and identifying security weaknesses to prevent reinfection. Historically, Virusdie has documented vulnerabilities across multiple classes, including remote code execution (RCE), cross-site scripting (XSS), and privilege escalation issues, with four CVEs currently recorded. The platform emphasizes automated scanning and remediation, though specific major incidents remain undocumented in public records. Its approach focuses on proactive security measures rather than reactive responses, catering to web administrators seeking to maintain server integrity against common web-based threats.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2025-14864 | Virusdie <= 1.1.7 - Missing Authorization to Authenticated (Subscriber+) API Key Disclosure — Virusdie – One-click website securityCWE-862 | 4.3 | Medium | 2026-02-19 |
| CVE-2025-68576 | WordPress Virusdie plugin <= 1.1.6 - Sensitive Data Exposure vulnerability — VirusdieCWE-497 | 4.3 | Medium | 2025-12-24 |
| CVE-2025-68577 | WordPress Virusdie plugin <= 1.1.6 - Broken Access Control vulnerability — VirusdieCWE-862 | 4.3 | Medium | 2025-12-24 |
| CVE-2025-53265 | WordPress Virusdie plugin <= 1.1.3 - Cross Site Request Forgery (CSRF) Vulnerability — VirusdieCWE-352 | 5.4 | Medium | 2025-06-27 |
This page lists every published CVE security advisory associated with virusdie. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.