Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total6
Critical1
High4
Medium1
Reset
Showing 1-6 of 6 records
Threat Entry Updated 2025-10-30

CVE-2025-11881 - Apppresser Plugin

The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'myappp_verify' function in all versions up to, and including, 4.5.0. This makes it possible for unauthenticated attackers to extract sensitive data including plugin and theme names and version numbers, which can be used to facilitate targeted attacks against outdated or vulnerable components.

PLUGIN Apppresser

CVE-2025-11881

MEDIUM CVSS 5.3 2025-10-30
Threat Entry Updated 2025-05-26

CVE-2025-1561 - Apppresser Plugin

The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' parameter in all versions up to, and including, 4.4.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages when logging is enabled that will execute whenever a user accesses an injected page.

PLUGIN Apppresser

CVE-2025-1561

HIGH CVSS 7.2 2025-03-13
Threat Entry Updated 2025-06-05

CVE-2024-11024 - Apppresser Plugin

The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.6. This is due to the plugin not properly validating a user's password reset code prior to updating their password. This makes it possible for unauthenticated attackers, with knowledge of a user's email address, to reset the user's password and gain access to their account.

PLUGIN Apppresser

CVE-2024-11024

CRITICAL CVSS 9.8 2024-11-26
Threat Entry Updated 2025-05-17

CVE-2024-9305 - Apppresser Plugin

The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.4.4. This is due to the appp_reset_password() and validate_reset_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator.

PLUGIN Apppresser

CVE-2024-9305

HIGH CVSS 8.1 2024-10-16
Threat Entry Updated 2025-06-05

CVE-2024-4611 - Apppresser Plugin

The AppPresser plugin for WordPress is vulnerable to improper missing encryption exception handling on the 'decrypt_value' and on the 'doCookieAuth' functions in all versions up to, and including, 4.3.2. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they previously used the login via the plugin API. This can only be exploited if the 'openssl' php extension is not loaded on the server.

PLUGIN Apppresser

CVE-2024-4611

HIGH CVSS 8.1 2024-05-29
Threat Entry Updated 2024-11-21

CVE-2023-4214 - Apppresser Plugin

The AppPresser plugin for WordPress is vulnerable to unauthorized password resets in versions up to, and including 4.2.5. This is due to the plugin generating too weak a reset code, and the code used to reset the password has no attempt or time limit.

PLUGIN Apppresser

CVE-2023-4214

HIGH CVSS 8.1 2023-11-18
Scroll to top