What this page helps you verify fast
This hub clusters every indexed record for Image Slider by NextCode – Photo & Video Slider so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
Review known vulnerability records for the WordPress plugin Image Slider by NextCode – Photo & Video Slider (`baslider`), including severity, CVE references, affected versions, and patch status.
Recent tracked CVEs on this page include CVE-2022-29439, CVE-2022-29437 and CVE-2022-29438, so operators can jump from disclosure to patch validation without scanning the full feed first.
Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.
Image Slider by NextCode <= 1.1.2 - Cross-Site Request Forgery to Slide Deletion
Image Slider by NextCode <= 1.1.2 - Multiple Cross-Site Request Forgery
Image Slider by NextCode <= 1.1.2 - Authenticated (Author+) Stored Cross-Site Scripting
This hub clusters every indexed record for Image Slider by NextCode – Photo & Video Slider so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
These recent records surface the CVE strings, patch cues, and direct report links most operators need first.
Cross-Site Request Forgery (CSRF) vulnerability in Image Slider by NextCode plugin
Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Image Slider by NextCode plugin
The Image Slider by NextCode plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.1.2 due to insufficient input sanitization and output escap...
Sorted by latest disclosure date so newly published issues surface first.
Cross-Site Request Forgery (CSRF) vulnerability in Image Slider by NextCode plugin
Multiple Cross-Site Request Forgery (CSRF) vulnerabilities in Image Slider by NextCode plugin
The Image Slider by NextCode plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and...