Browse all 4 CVE security advisories affecting wpmessiah. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Wpmessiah is a WordPress plugin primarily used for content management and website customization. Historically, it has been associated with multiple critical vulnerabilities, including remote code execution (RCE), cross-site scripting (XSS), and privilege escalation issues. The plugin's security record shows a pattern of insufficient input validation and improper access controls, leading to its inclusion in four CVE entries. These vulnerabilities have allowed attackers to execute arbitrary code, steal session cookies, and gain elevated privileges on affected WordPress installations. The plugin's widespread use in small to medium business websites has made it a notable target for exploitation campaigns.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-0807 | Frontis Blocks <= 1.1.6 - Unauthenticated Server-Side Request Forgery via 'url' Parameter — Frontis Blocks — Block Library for the Block EditorCWE-918 | 7.2 | High | 2026-01-24 |
| CVE-2024-12177 | Ai Image Alt Text Generator for WP <= 1.0.6 - Reflected Cross-Site Scripting — Ai Image Alt Text Generator for WPCWE-79 | 6.1 | Medium | 2025-01-30 |
| CVE-2024-12269 | Safe Ai Malware Protection for WP <= 1.0.17 - Missing Authorization to Unauthenticated Database Export — Safe Ai Malware Protection for WPCWE-862 | 7.5 | High | 2025-01-30 |
| CVE-2024-5204 | Swiss Toolkit For WP <= 1.0.7 - Authenticated (Contributor+) Authentication Bypass — Swiss Toolkit For WPCWE-288 | 8.8 | High | 2024-05-29 |
This page lists every published CVE security advisory associated with wpmessiah. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.