Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3
Critical0
High1
Medium2
Reset
Showing 1-3 of 3 records
Threat Entry Updated 2024-12-06

CVE-2024-10516 - Swift Performance Lite Plugin

The Swift Performance Lite plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 2.3.7.1 via the 'ajaxify' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

PLUGIN Swift Performance Lite

CVE-2024-10516

HIGH CVSS 8.1 2024-12-06
Threat Entry Updated 2024-11-21

CVE-2024-3722 - Swift Performance Lite Plugin

The Swift Performance Lite plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the ajax_handler() function in all versions up to, and including, 2.3.6.18. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve and modify settings.

PLUGIN Swift Performance Lite

CVE-2024-3722

MEDIUM CVSS 5.4 2024-05-14
Threat Entry Updated 2025-05-07

CVE-2023-6289 - Swift Performance Lite Plugin

The Swift Performance Lite WordPress plugin before 2.3.6.15 does not prevent users from exporting the plugin's settings, which may include sensitive information such as Cloudflare API tokens.

PLUGIN Swift Performance Lite

CVE-2023-6289

MEDIUM CVSS 4.3 2023-12-18
Scroll to top