amentotech CVE Vulnerabilities & Metrics

Focus on amentotech vulnerabilities and metrics.

Last updated: 16 Apr 2025, 22:25 UTC

About amentotech Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with amentotech. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total amentotech CVEs: 6
Earliest CVE date: 09 Aug 2021, 10:15 UTC
Latest CVE date: 12 Mar 2025, 10:15 UTC

Latest CVE reference: CVE-2024-13446

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): -100.0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): -100.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical amentotech CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.13

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 3
4.0-6.9 2
7.0-8.9 1
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS amentotech CVEs

These are the five CVEs with the highest CVSS scores for amentotech, sorted by severity first and recency.

All CVEs for amentotech

CVE-2024-13446 amentotech vulnerability CVSS: 0 12 Mar 2025, 10:15 UTC

The Workreap plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.2.5. This is due to the plugin not properly validating a user's identity prior to (1) performing a social auto-login or (2) updating their profile details (e.g. password). This makes it possible for unauthenticated attackers to (1) login as an arbitrary user if their email address is known or (2) change an arbitrary user's password, including administrators, and leverage that to gain access to their account. NOTE: This vulnerability was partially fixed in version 3.2.5.

CVE-2022-4239 amentotech vulnerability CVSS: 0 26 Dec 2022, 13:15 UTC

The Workreap WordPress theme before 2.6.4 does not verify that an addon service belongs to the user issuing the request, or indeed that it is an addon service, when processing the workreap_addons_service_remove action, allowing any user to delete any post by knowing or guessing the id.

CVE-2022-3846 amentotech vulnerability CVSS: 0 05 Dec 2022, 17:15 UTC

The Workreap WordPress theme before 2.6.3 has a vulnerability with the notifications feature as it's possible to read any user's notification (employer or freelancer) as the notification ID is brute-forceable.

CVE-2021-24501 amentotech vulnerability CVSS: 5.5 09 Aug 2021, 10:15 UTC

The Workreap WordPress theme before 2.2.2 had several AJAX actions missing authorization checks to verify that a user was authorized to perform critical operations such as modifying or deleting objects. This allowed a logged in user to modify or delete objects belonging to other users on the site.

CVE-2021-24500 amentotech vulnerability CVSS: 5.8 09 Aug 2021, 10:15 UTC

Several AJAX actions available in the Workreap WordPress theme before 2.2.2 lacked CSRF protections, as well as allowing insecure direct object references that were not validated. This allows an attacker to trick a logged in user to submit a POST request to the vulnerable site, potentially modifying or deleting arbitrary objects on the target site.

CVE-2021-24499 amentotech vulnerability CVSS: 7.5 09 Aug 2021, 10:15 UTC

The Workreap WordPress theme before 2.2.2 AJAX actions workreap_award_temp_file_uploader and workreap_temp_file_uploader did not perform nonce checks, or validate that the request is from a valid user in any other way. The endpoints allowed for uploading arbitrary files to the uploads/workreap-temp directory. Uploaded files were neither sanitized nor validated, allowing an unauthenticated visitor to upload executable code such as php scripts.