Documentation: Home / Guest posting / Frontend Posting / Front Editor – WP Front User Submit
This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
The WP Front User Submit / Front Editor plugin on WordPress can be attacked by hackers in versions up to 4.9.3. This is because the plugin does not properly clean up user input and output. This allow...
Read MoreThe Guest posting / Frontend Posting wordpress plugin, called WP Front User Submit / Front Editor plugin, has a security issue that could allow hackers to inject harmful code into a website. This can...
Read MoreThe WP Front User Submit / Front Editor WordPress plugin is vulnerable to a security issue in versions up to and including 4.0.4. This issue could allow an attacker with administrator-level permissio...
Read MoreThe Front User Submit | Front Editor plugin for WordPress has a security issue in versions up to 3.8.4 that could potentially allow an attacker with subscriber-level permission or higher to inject ma...
Read MoreThe Freemius SDK for WordPress is vulnerable to an attack known as Reflected Cross-Site Scripting. This attack is possible because of insufficient security measures in versions of the Freemius SDK up ...
Read MoreThe Front User Submit | Front Editor plugin for WordPress is vulnerable to a security issue. Attackers with subscriber-level permissions and above can inject web scripts into pages that will run when...
Read MoreFreemius, a software development kit used by hundreds of WordPress plugin and theme developers, had a security vulnerability in its older versions (up to and including 2.4.2). This vulnerability could...
Read More© Really Simple Plugins
CoC 70461155
Kalmarweg 14-5
9723 JG, Groningen (NL)