idehweb CVE Vulnerabilities & Metrics

Focus on idehweb vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About idehweb Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with idehweb. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total idehweb CVEs: 6
Earliest CVE date: 14 Mar 2022, 15:15 UTC
Latest CVE date: 14 Sep 2024, 13:15 UTC

Latest CVE reference: CVE-2024-6482

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical idehweb CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 1.07

Max CVSS: 6.4

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 5
4.0-6.9 1
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS idehweb CVEs

These are the five CVEs with the highest CVSS scores for idehweb, sorted by severity first and recency.

All CVEs for idehweb

CVE-2024-6482 idehweb vulnerability CVSS: 0 14 Sep 2024, 13:15 UTC

The Login with phone number plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.49. This is due to a lack of validation and missing capability check on user-supplied data in the 'lwp_update_password_action' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update their role to any other role, including Administrator. The vulnerability was partially patched in version 1.7.40. The login with phone number pro plugin was required to exploit the vulnerability in versions 1.7.40 - 1.7.49.

CVE-2024-37429 idehweb vulnerability CVSS: 0 22 Jul 2024, 09:15 UTC

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hamid Alinia – idehweb Login with phone number allows Stored XSS.This issue affects Login with phone number: from n/a through 1.7.35.

CVE-2023-4916 idehweb vulnerability CVSS: 0 13 Sep 2023, 03:15 UTC

The Login with phone number plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.6. This is due to missing nonce validation on the 'lwp_update_password_action' function. This makes it possible for unauthenticated attackers to change user password via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2023-23492 idehweb vulnerability CVSS: 0 20 Jan 2023, 19:15 UTC

The Login with Phone Number WordPress Plugin, version < 1.4.2, is affected by an authenticated SQL injection vulnerability in the 'ID' parameter of its 'lwp_forgot_password' action.

CVE-2022-0598 idehweb vulnerability CVSS: 0 01 Aug 2022, 13:15 UTC

The Login with phone number WordPress plugin before 1.3.8 does not sanitise and escape plugin settings which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.

CVE-2022-0593 idehweb vulnerability CVSS: 6.4 14 Mar 2022, 15:15 UTC

The Login with phone number WordPress plugin before 1.3.7 includes a file delete.php with no form of authentication or authorization checks placed in the plugin directory, allowing unauthenticated user to remotely delete the plugin files leading to a potential Denial of Service situation.