What this page helps you verify fast
This hub clusters every indexed record for WOLF – WordPress Posts Bulk Editor and Manager Professional so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
Review known vulnerability records for the WordPress plugin WOLF – WordPress Posts Bulk Editor and Manager Professional (`bulk-editor`), including severity, CVE references, affected versions, and patch status.
Recent tracked CVEs on this page include CVE-2026-32458, CVE-2025-24605 and CVE-2024-52396, so operators can jump from disclosure to patch validation without scanning the full feed first.
Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.
WOLF <= 1.0.6 - Authenticated (Subscriber+) Stored Cross-Site Scripting via wpbe_update_page_field
WOLF <= 1.0.8 - Unauthenticated Stored Cross-Site Scripting via profile_title
WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.1 - Cross-Site Request Forgery
WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.7 - Authenticated (Editor+) SQL Injection
WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.2 - Authenticated (Admin+) Stored Cross-Site Scripting
WOLF <= 1.0.7.1 - Authenticated (Administrator+) Stored Cross-Site Scripting
WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.1 - Missing Authorization
WOLF <= 1.0.7.1 - Cross-Site Request Forgery
This hub clusters every indexed record for WOLF – WordPress Posts Bulk Editor and Manager Professional so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
These recent records surface the CVE strings, patch cues, and direct report links most operators need first.
The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.0.8.7 due to insufficient escaping on...
The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.0.8.5. This makes it possible for...
The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to PathTraversal in all versions up to, and including, 1.0.8.3. This makes it possible for...
Sorted by latest disclosure date so newly published issues surface first.
The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.0.8.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query....
The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.0.8.5. This makes it possible for authenticated attackers, with Editor-level access and above, to perform actions on files...
The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to PathTraversal in all versions up to, and including, 1.0.8.3. This makes it possible for authenticated attackers, with editor-level access and above, to perform actions on CSV fil...
The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.8.2 due to insufficient input sanitization and output escaping. This makes it possible fo...
The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.8.1. This is due to missing or incorrect nonce validation on the wpbe_create_new_term, wpbe_update_tax_term,...
The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to unauthorized access, modification or loss of data due to a missing capability check on the wpbe_create_new_term, wpbe_update_tax_term, and wpbe_delete_tax_term functions in all v...
The WOLF plugin for WordPress is vulnerable to stored Cross-Site Scripting via the ‘profile_title’ parameter in versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrar...
The WOLF plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.7.1. This is due to missing or incorrect nonce validation on several of its functions. This makes it possible for unauthenticated attackers to invoke these functions vi...
The WOLF plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.0.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permiss...
The WOLF plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.7. This is due to missing or incorrect nonce validation on the create_profile function. This makes it possible for unauthenticated attackers to create new profiles via...
The WOLF plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the wpbe_update_page_field parameter in versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscri...
The WOLF plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.6. This is due to missing or incorrect nonce validation on the wpbe_update_page_field function. This makes it possible for unauthenticated attackers to invoke this func...