CVE-2025-1669 – WordPress WPSchoolPress SQL Injection Vulnerability

The following table lists the changes that have been made to the CVE-2025-1669 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1668 – WordPress WPSchoolPress Plugin User Deletion Vulnerability

The following table lists the changes that have been made to the CVE-2025-1668 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.

CVE-2025-1667 – WordPress WPSchoolPress Privilege Escalation Vulnerability

The School Management System – WPSchoolPress plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the wpsp_UpdateTeacher() function in all versions up to, and including, 2.2.16. This makes it possible for authenticated attackers, with teacher-level access and above, to update arbitrary user details including email which makes it possible […]

CVE-2024-12336 – WordPress WC Affiliate – Unauthenticated Data Exposure

The WC Affiliate – A Complete WooCommerce Affiliate Plugin plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ‘export_all_data’ function in all versions up to, and including, 2.5.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to expose sensitive affiliate data, including […]

CVE-2025-1653 – uListing WordPress Plugin Privilege Escalation Vulnerability

The following table lists the changes that have been made to the CVE-2025-1653 vulnerability over time. Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability’s severity, exploitability, or other characteristics.