webfactoryltd CVE Vulnerabilities & Metrics

Focus on webfactoryltd vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About webfactoryltd Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with webfactoryltd. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total webfactoryltd CVEs: 23
Earliest CVE date: 19 Dec 2019, 22:15 UTC
Latest CVE date: 08 Jun 2024, 06:15 UTC

Latest CVE reference: CVE-2024-5087

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 3

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -57.14%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -57.14%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical webfactoryltd CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.13

Max CVSS: 6.8

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 12
4.0-6.9 11
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS webfactoryltd CVEs

These are the five CVEs with the highest CVSS scores for webfactoryltd, sorted by severity first and recency.

All CVEs for webfactoryltd

CVE-2024-5087 webfactoryltd vulnerability CVSS: 0 08 Jun 2024, 06:15 UTC

The Minimal Coming Soon – Coming Soon Page plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the validate_ajax, deactivate_ajax, and save_ajax functions in all versions up to, and including, 2.38. This makes it possible for authenticated attackers, with Subscriber-level access and above, to edit the license key, which could disable features of the plugin.

CVE-2024-4661 webfactoryltd vulnerability CVSS: 0 08 Jun 2024, 06:15 UTC

The WP Reset plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_ajax function in all versions up to, and including, 2.02. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify the value fo the 'License Key' field for the 'Activate Pro License' setting.

CVE-2024-5770 webfactoryltd vulnerability CVSS: 0 08 Jun 2024, 05:15 UTC

The WP Force SSL & HTTPS SSL Redirect plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_save_setting' function in versions up to, and including, 1.66. This makes it possible for authenticated attackers, subscriber-level permissions and above, to update the plugin settings.

CVE-2024-1075 webfactoryltd vulnerability CVSS: 0 05 Feb 2024, 22:16 UTC

The Minimal Coming Soon – Coming Soon Page plugin for WordPress is vulnerable to maintenance mode bypass and information disclosure in all versions up to, and including, 2.37. This is due to the plugin improperly validating the request path. This makes it possible for unauthenticated attackers to bypass maintenance mode and view pages that should be hidden.

CVE-2023-50837 webfactoryltd vulnerability CVSS: 0 29 Dec 2023, 12:15 UTC

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WebFactory Ltd Login Lockdown – Protect Login Form.This issue affects Login Lockdown – Protect Login Form: from n/a through 2.06.

CVE-2023-49747 webfactoryltd vulnerability CVSS: 0 15 Dec 2023, 16:15 UTC

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebFactory Ltd Guest Author allows Stored XSS.This issue affects Guest Author: from n/a through 2.3.

CVE-2023-3601 webfactoryltd vulnerability CVSS: 0 14 Aug 2023, 20:15 UTC

The Simple Author Box WordPress plugin before 2.52 does not verify a user ID before outputting information about that user, leading to arbitrary user information disclosure to users with a role as low as Contributor.

CVE-2023-0832 webfactoryltd vulnerability CVSS: 0 09 Jun 2023, 06:15 UTC

The Under Construction plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.96. This is due to missing or incorrect nonce validation on the install_weglot function called via the admin_action_install_weglot action. This makes it possible for unauthenticated attackers to perform an unauthorized install of the Weglot Translate plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2023-0831 webfactoryltd vulnerability CVSS: 0 09 Jun 2023, 06:15 UTC

The Under Construction plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.96. This is due to missing or incorrect nonce validation on the dismiss_notice function called via the admin_action_ucp_dismiss_notice action. This makes it possible for unauthenticated attackers to dismiss plugin notifications via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2023-1913 webfactoryltd vulnerability CVSS: 0 06 Apr 2023, 15:15 UTC

The Maps Widget for Google Maps for WordPress is vulnerable to Stored Cross-Site Scripting via widget settings in versions up to, and including, 4.24 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

CVE-2022-1583 webfactoryltd vulnerability CVSS: 4.3 30 May 2022, 09:15 UTC

The External Links in New Window / New Tab WordPress plugin before 1.43 does not ensure window.opener is set to "null" when links to external sites are clicked, which may enable tabnabbing attacks to occur.

CVE-2022-1582 webfactoryltd vulnerability CVSS: 4.3 30 May 2022, 09:15 UTC

The External Links in New Window / New Tab WordPress plugin before 1.43 does not properly escape URLs it concatenates to onclick event handlers, which makes Stored Cross-Site Scripting attacks possible.

CVE-2021-36909 webfactoryltd vulnerability CVSS: 5.5 18 Nov 2021, 15:15 UTC

Authenticated Database Reset vulnerability in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows any authenticated user to wipe the entire database regardless of their authorization. It leads to a complete website reset and takeover.

CVE-2021-36908 webfactoryltd vulnerability CVSS: 6.8 18 Nov 2021, 15:15 UTC

Cross-Site Request Forgery (CSRF) vulnerability in WebFactory Ltd. WP Reset PRO plugin <= 5.98 versions.

CVE-2021-24533 webfactoryltd vulnerability CVSS: 3.5 23 Aug 2021, 12:15 UTC

The Maintenance WordPress plugin before 4.03 does not sanitise or escape some of its settings, allowing high privilege users such as admin to se Cross-Site Scripting payload in them (even when the unfiltered_html capability is disallowed), which will be triggered in the frontend

CVE-2021-24424 webfactoryltd vulnerability CVSS: 3.5 12 Jul 2021, 20:15 UTC

The WP Reset – Most Advanced WordPress Reset Tool WordPress plugin before 1.90 did not sanitise or escape its extra_data parameter when creating a snapshot via the admin dashboard, leading to an authenticated Stored Cross-Site Scripting issue

CVE-2021-24142 webfactoryltd vulnerability CVSS: 6.5 18 Mar 2021, 15:15 UTC

Unvaludated input in the 301 Redirects - Easy Redirect Manager WordPress plugin, versions before 2.51, did not sanitise its "Redirect From" column when importing a CSV file, allowing high privilege users to perform SQL injections.

CVE-2020-7048 webfactoryltd vulnerability CVSS: 6.4 16 Jan 2020, 21:15 UTC

The WordPress plugin, WP Database Reset through 3.1, contains a flaw that allowed any unauthenticated user to reset any table in the database to the initial WordPress set-up state (deleting all site content stored in that table), as demonstrated by a wp-admin/admin-post.php?db-reset-tables[]=comments URI.

CVE-2020-7047 webfactoryltd vulnerability CVSS: 6.5 16 Jan 2020, 21:15 UTC

The WordPress plugin, WP Database Reset through 3.1, contains a flaw that gave any authenticated user, with minimal permissions, the ability (with a simple wp-admin/admin.php?db-reset-tables[]=users request) to escalate their privileges to administrator while dropping all other users from the table.

CVE-2020-6168 webfactoryltd vulnerability CVSS: 6.5 09 Jan 2020, 20:15 UTC

A flaw in the WordPress plugin, Minimal Coming Soon & Maintenance Mode through 2.10, allows authenticated users with basic access to enable and disable maintenance-mode settings (impacting the availability and confidentiality of a vulnerable site, along with the integrity of the setting).

CVE-2020-6166 webfactoryltd vulnerability CVSS: 5.5 09 Jan 2020, 20:15 UTC

A flaw in the WordPress plugin, Minimal Coming Soon & Maintenance Mode through 2.15, allows authenticated users with basic access to export settings and change maintenance-mode themes.

CVE-2020-6167 webfactoryltd vulnerability CVSS: 6.8 09 Jan 2020, 19:15 UTC

A flaw in the WordPress plugin, Minimal Coming Soon & Maintenance Mode through 2.10, allows a CSRF attack to enable maintenance mode, inject XSS, modify several important settings, or include remote files as a logo.

CVE-2019-19915 webfactoryltd vulnerability CVSS: 6.0 19 Dec 2019, 22:15 UTC

The "301 Redirects - Easy Redirect Manager" plugin before 2.45 for WordPress allows users (with subscriber or greater access) to modify, delete, or inject redirect rules, and exploit XSS, with the /admin-ajax.php?action=eps_redirect_save and /admin-ajax.php?action=eps_redirect_delete actions. This could result in a loss of site availability, malicious redirects, and user infections. This could also be exploited via CSRF.