Browse all 4 CVE security advisories affecting xjb. AI-powered Chinese analysis, POCs, and references for each vulnerability.
XJB is a web application framework primarily used for building dynamic content management systems and e-commerce platforms. Historically, it has been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and insecure default configurations. The framework's modular architecture has introduced additional attack surfaces through third-party plugins. While no major public security incidents have been widely documented, its four recorded CVEs highlight consistent issues with authentication bypass and data exposure, particularly in older versions. Security researchers note that XJB deployments frequently require hardening to address default credential risks and insufficient session management protections.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-3460 | REST API TO MiniProgram <= 5.1.2 - Authenticated (Subscriber+) Insecure Direct Object Reference via 'userid' REST API Parameter — REST API TO MiniProgramCWE-20 | 5.3 | Medium | 2026-03-21 |
| CVE-2025-28886 | WordPress REST API TO MiniProgram plugin <= 5.1.2 - Cross Site Request Forgery (CSRF) vulnerability — REST API TO MiniProgramCWE-352 | 4.3 | Medium | 2025-03-11 |
| CVE-2024-8485 | REST API TO MiniProgram <= 4.7.1 - Unauthenticated Arbitrary User Email Update and Privilege Escalation via Account Takeover — REST API TO MiniProgramCWE-639 | 9.8 | Critical | 2024-09-25 |
| CVE-2024-8484 | REST API TO MiniProgram <= 4.7.1 - Unauthenticated SQL Injection — REST API TO MiniProgramCWE-89 | 7.5 | High | 2024-09-25 |
This page lists every published CVE security advisory associated with xjb. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.