VulDB Updates Updates
- CVE-2024-0966 | Shariff Wrapper Plugin up to 4.6.9 on WordPress cross site scriptingby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability labeled as problematic has been found in Shariff Wrapper Plugin up to 4.6.9 on WordPress. This vulnerability affects unknown code. Such manipulation leads to cross site scripting. This vulnerability is referenced as CVE-2024-0966. It is possible to launch the attack remotely. No exploit is available.
- CVE-2024-1213 | Easy Social Feed Plugin up to 6.5.4 on WordPress cross-site request forgeryby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability has been found in Easy Social Feed Plugin up to 6.5.4 on WordPress and classified as problematic. Affected is an unknown function. Performing a manipulation results in cross-site request forgery. This vulnerability is reported as CVE-2024-1213. The attack is possible to be carried out remotely. No exploit exists.
- CVE-2024-1214 | Easy Social Feed Plugin up to 6.5.4 on WordPress cross-site request forgeryby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability described as problematic has been identified in Easy Social Feed Plugin up to 6.5.4 on WordPress. Impacted is an unknown function. Executing a manipulation can lead to cross-site request forgery. This vulnerability is tracked as CVE-2024-1214. The attack can be launched remotely. No exploit exists.
- CVE-2023-6500 | Shariff Wrapper Plugin up to 4.6.9 on WordPress Shortcode cross site scriptingby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability was found in Shariff Wrapper Plugin up to 4.6.9 on WordPress. It has been classified as problematic. Affected by this issue is some unknown functionality of the component Shortcode Handler. The manipulation leads to cross site scripting. This vulnerability is traded as CVE-2023-6500. It is possible to initiate the attack remotely. There is no exploit available.
- CVE-2024-1278 | Easy Social Feed Plugin up to 6.5.4 on WordPress Shortcode cross site scriptingby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability was found in Easy Social Feed Plugin up to 6.5.4 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Shortcode Handler. Executing a manipulation can lead to cross site scripting. This vulnerability appears as CVE-2024-1278. The attack may be performed from remote. There is no available exploit.
- CVE-2024-1711 | Mediavine Create Plugin up to 1.9.4 on WordPress ID sql injectionby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability was found in Mediavine Create Plugin up to 1.9.4 on WordPress. It has been declared as critical. The impacted element is an unknown function. Such manipulation of the argument ID leads to sql injection. This vulnerability is documented as CVE-2024-1711. The attack can be executed remotely. There is not any exploit available.
- CVE-2024-1326 | jegtheme Jeg Elementor Kit Plugin up to 2.6.2 on WordPress HTML Tag Attribute HTML injectionby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability, which was classified as problematic, was found in jegtheme Jeg Elementor Kit Plugin up to 2.6.2 on WordPress. This vulnerability affects unknown code of the component HTML Tag Attribute Handler. Such manipulation leads to HTML injection. This vulnerability is uniquely identified as CVE-2024-1326. The attack can be launched remotely. No exploit exists.
- CVE-2024-1844 | RevivePress Plugin up to 1.5.6 on WordPress authorizationby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability categorized as critical has been discovered in RevivePress Plugin up to 1.5.6 on WordPress. This impacts an unknown function. Executing a manipulation can lead to missing authorization. This vulnerability appears as CVE-2024-1844. The attack may be performed from remote. There is no available exploit.
- CVE-2024-2304 | Animated Headline Plugin up to 4.0 on WordPress Shortcode cross site scriptingby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability described as problematic has been identified in Animated Headline Plugin up to 4.0 on WordPress. This affects an unknown part of the component Shortcode Handler. Such manipulation leads to cross site scripting. This vulnerability is uniquely identified as CVE-2024-2304. The attack can be launched remotely. No exploit exists.
- CVE-2024-1477 | aankit Easy Maintenance Mode Plugin up to 1.4.2 on WordPress REST API information disclosureby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability was found in aankit Easy Maintenance Mode Plugin up to 1.4.2 on WordPress and classified as problematic. The affected element is an unknown function of the component REST API. Such manipulation leads to information disclosure. This vulnerability is referenced as CVE-2024-1477. It is possible to launch the attack remotely. No exploit is available.
- CVE-2024-2129 | wpbits WPBITS Addons for Elementor Page Builder Plugin up to 1.3.4.2 on WordPress Heading Widget cross site scriptingby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability was found in wpbits WPBITS Addons for Elementor Page Builder Plugin up to 1.3.4.2 on WordPress. It has been classified as problematic. The impacted element is an unknown function of the component Heading Widget. Performing a manipulation results in cross site scripting. This vulnerability is identified as CVE-2024-2129. The attack can be initiated remotely. There is not any exploit available.
- CVE-2024-2459 | wpvncom UX Flat Plugin up to 4.1 on WordPress cross site scriptingby vuldb.com on April 13, 2026 at 9:37 am
A vulnerability was found in wpvncom UX Flat Plugin up to 4.1 on WordPress. It has been declared as problematic. This affects an unknown function. Executing a manipulation can lead to cross site scripting. This vulnerability is tracked as CVE-2024-2459. The attack can be launched remotely. No exploit exists.
- CVE-2026-35625 | OpenClaw up to 2026.3.24 operator.admin incorrect privileged apis (GHSA-fqw4-mph7-2vr8 / WID-SEC-2026-0884)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability marked as problematic has been reported in OpenClaw up to 2026.3.24. Affected is the function operator.admin. This manipulation causes incorrect use of privileged apis. This vulnerability appears as CVE-2026-35625. The attack requires local access. There is no available exploit. It is suggested to upgrade the affected component.
- CVE-2026-35628 | OpenClaw up to 2026.3.24 excessive authentication (GHSA-vcx4-4qxg-mfp4 / WID-SEC-2026-0884)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability was found in OpenClaw up to 2026.3.24. It has been classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improper restriction of excessive authentication attempts. This vulnerability is listed as CVE-2026-35628. The attack may be initiated remotely. There is no available exploit. Upgrading the affected component is recommended.
- CVE-2026-35617 | OpenClaw up to 2026.3.24 Policy Enforcement reliance on untrusted inputs in a security decision (GHSA-52q4-3xjc-6778 / WID-SEC-2026-0884)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability marked as problematic has been reported in OpenClaw up to 2026.3.24. This issue affects some unknown processing of the component Policy Enforcement Handler. Performing a manipulation results in reliance on untrusted inputs in a security decision. This vulnerability is known as CVE-2026-35617. Remote exploitation of the attack is possible. No exploit is available. It is suggested to upgrade the affected component.
- CVE-2026-34512 | OpenClaw up to 2026.3.24 kill killSubagentRunAdmin authorization (GHSA-9p93-7j67-5pc2 / WID-SEC-2026-0884)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability, which was classified as problematic, has been found in OpenClaw up to 2026.3.24. Affected by this vulnerability is the function killSubagentRunAdmin of the file /sessions/:sessionKey/kill. Performing a manipulation results in incorrect authorization. This vulnerability was named CVE-2026-34512. The attack may be initiated remotely. There is no available exploit. It is advisable to upgrade the affected component.
- CVE-2026-35670 | OpenClaw up to 2026.3.21 reliance on untrusted inputs in a security decision (GHSA-wv46-v6xc-2qhf / WID-SEC-2026-0856)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability marked as problematic has been reported in OpenClaw up to 2026.3.21. This issue affects some unknown processing. This manipulation causes reliance on untrusted inputs in a security decision. The identification of this vulnerability is CVE-2026-35670. It is possible to initiate the attack remotely. There is no exploit available. It is suggested to upgrade the affected component.
- CVE-2026-35660 | OpenClaw up to 2026.3.22 New Message /reset authorization (GHSA-wq58-2pvg-5h4f / WID-SEC-2026-0856)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability, which was classified as problematic, was found in OpenClaw up to 2026.3.22. This vulnerability affects unknown code of the file /reset of the component New Message Handler. Such manipulation leads to missing authorization. This vulnerability is documented as CVE-2026-35660. The attack can be executed remotely. There is not any exploit available. You should upgrade the affected component.
- CVE-2026-35666 | OpenClaw up to 2026.3.21 /usr/bin/time name resolution (GHSA-qm9x-v7cx-7rq4 / WID-SEC-2026-0856)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability labeled as critical has been found in OpenClaw up to 2026.3.21. This vulnerability affects unknown code of the file /usr/bin/time. The manipulation results in incorrectly-resolved name. This vulnerability was named CVE-2026-35666. The attack may be performed from remote. There is no available exploit. The affected component should be upgraded.
- CVE-2026-35656 | OpenClaw up to 2026.3.21 Header X-Forwarded-For authentication spoofing (GHSA-844j-xrrq-wgh4 / WID-SEC-2026-0856)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability labeled as critical has been found in OpenClaw up to 2026.3.21. Impacted is an unknown function of the component Header Handler. The manipulation of the argument X-Forwarded-For results in authentication bypass by spoofing. This vulnerability is identified as CVE-2026-35656. The attack can be executed remotely. There is not any exploit available. The affected component should be upgraded.
- CVE-2026-35659 | OpenClaw up to 2026.3.21 data authenticity (GHSA-rvqr-hrcc-j9vv / WID-SEC-2026-0856)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability classified as problematic was found in OpenClaw up to 2026.3.21. Affected by this issue is some unknown functionality. The manipulation results in insufficient verification of data authenticity. This vulnerability is cataloged as CVE-2026-35659. The attack must originate from the local network. There is no exploit available. Upgrading the affected component is advised.
- CVE-2026-35658 | OpenClaw up to 2026.3.1 Image Parser exposure of resource (GHSA-cfp9-w5v9-3q4h / WID-SEC-2026-0856)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability has been found in OpenClaw up to 2026.3.1 and classified as problematic. The impacted element is an unknown function of the component Image Parser. The manipulation leads to exposure of resource. This vulnerability is documented as CVE-2026-35658. The attack can be initiated remotely. There is not any exploit available. The affected component should be upgraded.
- CVE-2026-35652 | OpenClaw up to 2026.3.21 Interactive Call incorrect behavior order (GHSA-8883-9w57-vwv6 / WID-SEC-2026-0856)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability classified as critical was found in OpenClaw up to 2026.3.21. This issue affects some unknown processing of the component Interactive Call Handler. Such manipulation leads to incorrect behavior order. This vulnerability is listed as CVE-2026-35652. The attack may be performed from remote. There is no available exploit. Upgrading the affected component is advised.
- CVE-2026-35655 | OpenClaw up to 2026.3.21 rawInput reliance on untrusted inputs in a security decision (GHSA-74wf-h43j-vvmj / WID-SEC-2026-0856)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability, which was classified as problematic, was found in OpenClaw up to 2026.3.21. The affected element is an unknown function. Executing a manipulation of the argument rawInput can lead to reliance on untrusted inputs in a security decision. This vulnerability is registered as CVE-2026-35655. It is possible to launch the attack remotely. No exploit is available. You should upgrade the affected component.
- CVE-2026-35649 | OpenClaw up to 2026.3.21 Setting permissive list of allowed inputs (GHSA-pw7h-9g6p-c378 / WID-SEC-2026-0856)by vuldb.com on April 13, 2026 at 9:25 am
A vulnerability described as critical has been identified in OpenClaw up to 2026.3.21. This affects an unknown part of the component Setting Handler. The manipulation results in permissive list of allowed inputs. This vulnerability is identified as CVE-2026-35649. The attack can be executed remotely. There is not any exploit available. Upgrading the affected component is recommended.
- CVE-2026-21011 | Samsung Devices Bluetooth privileges assignment (EUVD-2026-21866)by vuldb.com on April 13, 2026 at 8:38 am
A vulnerability was found in Samsung Devices. It has been classified as critical. The impacted element is an unknown function of the component Bluetooth. The manipulation leads to incorrect privilege assignment. This vulnerability is traded as CVE-2026-21011. It is possible to launch the attack on the physical device. There is no exploit available. It is suggested to install a patch to address this issue.
- CVE-2026-21010 | Samsung Devices Retail Mode input validation (EUVD-2026-21864)by vuldb.com on April 13, 2026 at 8:38 am
A vulnerability was found in Samsung Devices and classified as critical. The affected element is an unknown function of the component Retail Mode. Executing a manipulation can lead to improper input validation. This vulnerability appears as CVE-2026-21010. The physical device can be targeted for the attack. There is no available exploit. Applying a patch is advised to resolve this issue.
- CVE-2026-21012 | Samsung Devices AODManager file inclusion (EUVD-2026-21868)by vuldb.com on April 13, 2026 at 8:38 am
A vulnerability was found in Samsung Devices. It has been declared as critical. This affects an unknown function of the component AODManager. The manipulation results in file inclusion. This vulnerability is known as CVE-2026-21012. Attacking locally is a requirement. No exploit is available. A patch should be applied to remediate this issue.
- CVE-2026-6163 | code-projects Lost and Found Thing Management 1.0 /catageory.php cat sql injection (EUVD-2026-21874)by vuldb.com on April 13, 2026 at 8:38 am
A vulnerability categorized as critical has been discovered in code-projects Lost and Found Thing Management 1.0. Affected by this issue is some unknown functionality of the file /catageory.php. Such manipulation of the argument cat leads to sql injection. This vulnerability is referenced as CVE-2026-6163. It is possible to launch the attack remotely. Furthermore, an exploit is available.
- CVE-2026-21013 | Samsung Galaxy Wearable 2.2.50/2.2.61.24112961/2.2.63.25042861/2.2.68 default permission (EUVD-2026-21870)by vuldb.com on April 13, 2026 at 8:38 am
A vulnerability was found in Samsung Galaxy Wearable 2.2.50/2.2.61.24112961/2.2.63.25042861/2.2.68. It has been rated as critical. This impacts an unknown function. This manipulation causes incorrect default permissions. This vulnerability is handled as CVE-2026-21013. It is possible to launch the attack on the local host. There is not any exploit available. Upgrading the affected component is advised.





