Vulnerabilities (CVE)

Filtered by vendor Relevanssi Subscribe
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-7630 1 Relevanssi 1 Relevanssi 2025-01-29 N/A 5.3 MEDIUM
The Relevanssi – A Better Search plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.22.2 via the relevanssi_do_query() due to insufficient limitations on the posts that are returned when searching. This makes it possible for unauthenticated attackers to extract potentially sensitive information from password protected posts.
CVE-2024-3214 1 Relevanssi 1 Relevanssi 2025-01-28 N/A 5.8 MEDIUM
The Relevanssi – A Better Search plugin for WordPress is vulnerable to CSV Injection in all versions up to, and including, 4.22.1. This makes it possible for unauthenticated attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
CVE-2018-9034 1 Relevanssi 1 Relevanssi 2024-11-21 3.5 LOW 5.4 MEDIUM
Cross-site scripting (XSS) vulnerability in lib/interface.php of the Relevanssi plugin 4.0.4 for WordPress allows remote attackers to inject arbitrary JavaScript or HTML via the tab GET parameter.
CVE-2017-1000225 1 Relevanssi 1 Relevanssi 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
Reflected XSS in Relevanssi Premium version 1.14.8 when using relevanssi_didyoumean() could allow unauthenticated attacker to do almost anything an admin can
CVE-2017-1000038 1 Relevanssi 1 Relevanssi 2024-11-21 4.3 MEDIUM 6.1 MEDIUM
WordPress plugin Relevanssi version 3.5.7.1 is vulnerable to stored XSS resulting in attacker being able to execute JavaScript on the affected site
CVE-2016-10949 1 Relevanssi 1 Relevanssi 2024-11-21 6.8 MEDIUM 8.8 HIGH
The Relevanssi Premium plugin before 1.14.6.1 for WordPress has SQL injection with resultant unsafe unserialization.
CVE-2014-9443 1 Relevanssi 1 Relevanssi 2024-11-21 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in the Relevanssi plugin before 3.3.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.