Plugin Vulnerability Hub
Plugin 12 known issues Latest disclosed Mar 12, 2026

WOLF – WordPress Posts Bulk Editor and Manager Professional Vulnerabilities

Review known vulnerability records for the WordPress plugin WOLF – WordPress Posts Bulk Editor and Manager Professional (`bulk-editor`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2026-32458, CVE-2025-24605 and CVE-2024-52396, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
12
High or Critical
0
Patch Coverage
100%
Last Updated
Mar 19, 2026
Priority CVE Quick Links

Fast paths into WOLF – WordPress Posts Bulk Editor and Manager Professional CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
11
CVE-2023-31218 Medium 1.0.7
CVE-2023-31218 WOLF – WordPress Posts Bulk Editor and Manager Professional Stored Cross-Site Scripting

WOLF <= 1.0.6 - Authenticated (Subscriber+) Stored Cross-Site Scripting via wpbe_update_page_field

CVE-2024-22159 Medium 1.0.8.1
CVE-2024-22159 WOLF – WordPress Posts Bulk Editor and Manager Professional Stored Cross-Site Scripting

WOLF <= 1.0.8 - Unauthenticated Stored Cross-Site Scripting via profile_title

CVE-2024-0790 Medium 1.0.8.2
CVE-2024-0790 WOLF – WordPress Posts Bulk Editor and Manager Professional Cross-Site Request Forgery

WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.1 - Cross-Site Request Forgery

CVE-2026-32458 Medium 1.0.9
CVE-2026-32458 WOLF – WordPress Posts Bulk Editor and Manager Professional SQL Injection

WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.7 - Authenticated (Editor+) SQL Injection

CVE-2024-34558 Medium 1.0.8.3
CVE-2024-34558 WOLF – WordPress Posts Bulk Editor and Manager Professional Stored Cross-Site Scripting

WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.2 - Authenticated (Admin+) Stored Cross-Site Scripting

CVE-2023-44990 Medium 1.0.7.2
CVE-2023-44990 WOLF – WordPress Posts Bulk Editor and Manager Professional Stored Cross-Site Scripting

WOLF <= 1.0.7.1 - Authenticated (Administrator+) Stored Cross-Site Scripting

CVE-2024-0791 Medium 1.0.8.2
CVE-2024-0791 WOLF – WordPress Posts Bulk Editor and Manager Professional Vulnerability

WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.1 - Missing Authorization

CVE-2023-46152 Medium 1.0.7.2
CVE-2023-46152 WOLF – WordPress Posts Bulk Editor and Manager Professional Cross-Site Request Forgery

WOLF <= 1.0.7.1 - Cross-Site Request Forgery

Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for WOLF – WordPress Posts Bulk Editor and Manager Professional so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
12 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 0 high severity findings.
Recent CVEs
CVE-2026-32458, CVE-2025-24605 and CVE-2024-52396
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for WOLF – WordPress Posts Bulk Editor and Manager Professional

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2026-32458
CVE-2026-32458: WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.7 - Authenticated (Editor+) SQL Injection

The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.0.8.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query....

Published
Mar 12, 2026
Patched Release
1.0.9
Affected Versions
Versions up to 1.0.8.7
Next Step
Update to 1.0.9 or newer if supported.
Plugin Low Patched: Yes CVE-2025-24605
CVE-2025-24605: WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.5 - Authenticated (Editor+) Path Traversal

The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.0.8.5. This makes it possible for authenticated attackers, with Editor-level access and above, to perform actions on files...

Published
Dec 27, 2024
Patched Release
1.0.8.6
Affected Versions
Versions up to 1.0.8.5
Next Step
Update to 1.0.8.6 or newer if supported.
Plugin Low Patched: Yes CVE-2024-52396
CVE-2024-52396: WOLF <= 1.0.8.3 - Authenticated (Editor+) CSV Path Traversal

The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to PathTraversal in all versions up to, and including, 1.0.8.3. This makes it possible for authenticated attackers, with editor-level access and above, to perform actions on CSV fil...

Published
Nov 11, 2024
Patched Release
1.0.8.4
Affected Versions
Versions up to 1.0.8.3
Next Step
Update to 1.0.8.4 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-34558
CVE-2024-34558: WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.2 - Authenticated (Admin+) Stored Cross-Site Scripting

The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.8.2 due to insufficient input sanitization and output escaping. This makes it possible fo...

Published
May 07, 2024
Patched Release
1.0.8.3
Affected Versions
Versions up to 1.0.8.2
Next Step
Update to 1.0.8.3 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-0790
CVE-2024-0790: WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.1 - Cross-Site Request Forgery

The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.8.1. This is due to missing or incorrect nonce validation on the wpbe_create_new_term, wpbe_update_tax_term,...

Published
Jan 30, 2024
Patched Release
1.0.8.2
Affected Versions
Versions up to 1.0.8.1
Next Step
Update to 1.0.8.2 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-0791
CVE-2024-0791: WOLF – WordPress Posts Bulk Editor and Manager Professional <= 1.0.8.1 - Missing Authorization

The WOLF – WordPress Posts Bulk Editor and Manager Professional plugin for WordPress is vulnerable to unauthorized access, modification or loss of data due to a missing capability check on the wpbe_create_new_term, wpbe_update_tax_term, and wpbe_delete_tax_term functions in all v...

Published
Jan 30, 2024
Patched Release
1.0.8.2
Affected Versions
Versions up to 1.0.8.1
Next Step
Update to 1.0.8.2 or newer if supported.
Plugin Medium Patched: Yes CVE-2024-22159
CVE-2024-22159: WOLF <= 1.0.8 - Unauthenticated Stored Cross-Site Scripting via profile_title

The WOLF plugin for WordPress is vulnerable to stored Cross-Site Scripting via the ‘profile_title’ parameter in versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrar...

Published
Jan 16, 2024
Patched Release
1.0.8.1
Affected Versions
Versions up to 1.0.8
Next Step
Update to 1.0.8.1 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-46152
CVE-2023-46152: WOLF <= 1.0.7.1 - Cross-Site Request Forgery

The WOLF plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.7.1. This is due to missing or incorrect nonce validation on several of its functions. This makes it possible for unauthenticated attackers to invoke these functions vi...

Published
Oct 17, 2023
Patched Release
1.0.7.2
Affected Versions
Versions up to 1.0.7.1
Next Step
Update to 1.0.7.2 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-44990
CVE-2023-44990: WOLF <= 1.0.7.1 - Authenticated (Administrator+) Stored Cross-Site Scripting

The WOLF plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.0.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permiss...

Published
Oct 02, 2023
Patched Release
1.0.7.2
Affected Versions
Versions up to 1.0.7.1
Next Step
Update to 1.0.7.2 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-34028
CVE-2023-34028: WOLF <= 1.0.7 - Cross-Site Request Forgery via create_profile

The WOLF plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.7. This is due to missing or incorrect nonce validation on the create_profile function. This makes it possible for unauthenticated attackers to create new profiles via...

Published
May 29, 2023
Patched Release
1.0.7.1
Affected Versions
Versions up to 1.0.7
Next Step
Update to 1.0.7.1 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-31218
CVE-2023-31218: WOLF <= 1.0.6 - Authenticated (Subscriber+) Stored Cross-Site Scripting via wpbe_update_page_field

The WOLF plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the wpbe_update_page_field parameter in versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscri...

Published
May 03, 2023
Patched Release
1.0.7
Affected Versions
Versions up to 1.0.6
Next Step
Update to 1.0.7 or newer if supported.
Plugin Medium Patched: Yes
WOLF <= 1.0.6 - Cross-Site Request Forgery via wpbe_update_page_field

The WOLF plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.6. This is due to missing or incorrect nonce validation on the wpbe_update_page_field function. This makes it possible for unauthenticated attackers to invoke this func...

Published
May 03, 2023
Patched Release
1.0.7
Affected Versions
Versions up to 1.0.6
Next Step
Update to 1.0.7 or newer if supported.