Vulnerabilities (CVE)

Filtered by vendor Benjaminrojas Subscribe
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-25591 1 Benjaminrojas 1 Wp Editor 2025-07-11 N/A 5.3 MEDIUM
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Benjamin Rojas WP Editor.This issue affects WP Editor: from n/a through 1.2.7.
CVE-2025-3295 1 Benjaminrojas 1 Wp Editor 2025-07-09 N/A 4.9 MEDIUM
The WP Editor plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to read arbitrary files on the affected site's server which may reveal sensitive information.
CVE-2025-3294 1 Benjaminrojas 1 Wp Editor 2025-07-09 N/A 7.2 HIGH
The WP Editor plugin for WordPress is vulnerable to arbitrary file update due to missing file path validation in all versions up to, and including, 1.2.9.1. This makes it possible for authenticated attackers, with Administrator-level access and above, to overwrite arbitrary files on the affected site's server which may make remote code execution possible assuming the files can be written to by the web server.
CVE-2021-24151 1 Benjaminrojas 1 Wp Editor 2025-06-20 N/A 7.2 HIGH
The WP Editor WordPress plugin before 1.2.7 did not sanitise or validate its setting fields leading to an authenticated (admin+) blind SQL injection issue via an arbitrary parameter when making a request to save the settings.
CVE-2016-10886 1 Benjaminrojas 1 Wp Editor 2024-11-21 7.5 HIGH 9.8 CRITICAL
The wp-editor plugin before 1.2.6 for WordPress has incorrect permissions.
CVE-2016-10885 1 Benjaminrojas 1 Wp Editor 2024-11-21 6.8 MEDIUM 8.8 HIGH
The wp-editor plugin before 1.2.6 for WordPress has CSRF.
CVE-2022-2446 1 Benjaminrojas 1 Wp Editor 2024-09-27 N/A 7.2 HIGH
The WP Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'current_theme_root' parameter in versions up to, and including 1.2.9. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.