Customise Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorised as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.

Other uncategorised cookies are those that are being analysed and have not been classified into a category as yet.

Skip to content

Report details

On the report details page, you can see all the details regarding this particular vulnerability.

At the top section, you can see the current status of this vulnerability, the Patchstack patch priority rating, and which versions of your software are affected by this vulnerability. Patchstack uses different icons throughout the platform, you can read more about the icons definitions here.

Under that, you can see the CVSS score for this entry, with an explanatory message of what makes this finding a vulnerability.

On the right side, it shows the date when this vulnerability was published.

To see how this vulnerability can be exploited, scroll down to the section called How to reproduce. The researchers post the details there, sometimes with screenshots or videos attached.

You can upload the fixed version of your software straight from this page. Scroll to How to disclose section of the page, to upload the .zip file of your software/code. Alternatively, you can send us a link to your code, by clicking Link to fix at the top of this page.

To read more about uploading the security fix, and how the process works in general, check this article.

The last section shows all the following details:

  • Software name
  • Vulnerable versions
  • OWASP Top 10 - vulnerability type by OWASP Top 10 classification
  • Type - whether the software type is a plugin or a theme
  • Classification - vulnerability class
  • Patch priority - level of priority regarding patching (low / medium / high)
  • CVE ID - unique ID number for identifying this vulnerability in the Common Vulnerabilities and Exposures database
  • CVSS severity - the Common Vulnerability Scoring System rating
  • Required privilege - which is the minimum user role necessary to perform the attack
  • Developer - name of the vendor
  • Credits - name of the researcher who reported this vulnerability
1