What this page helps you verify fast
This hub clusters every indexed record for Maspik – Ultimate Spam Protection so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
Review known vulnerability records for the WordPress plugin Maspik – Ultimate Spam Protection (`contact-forms-anti-spam`), including severity, CVE references, affected versions, and patch status.
Recent tracked CVEs on this page include CVE-2025-9979, CVE-2025-9888 and CVE-2024-53806, so operators can jump from disclosure to patch validation without scanning the full feed first.
Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.
Maspik – Spam blacklist <= 0.9.2 - Unauthenticated Stored Cross-Site Scripting via efas_add_to_log
Maspik – Spam blacklist <= 0.10.3 - Bypass
Maspik – Spam blacklist <= 2.1.2 - Authenticated (Administrator+) Stored Cross-Site Scripting
Maspik – Spam blacklist <= 0.10.6 - Authenticated (Administrator+) Stored Cross-Site Scripting via settings
Maspik <= 2.5.6 - Authenticated (Subscriber+) Missing Authorization to Spam Log Export
Maspik <= 2.5.6 - Cross-Site Request Forgery
Maspik – Spam blacklist <= 2.2.7 - Cross-Site Request Forgery to Plugin Settings Change
Maspik – Spam blacklist <= 0.7.8 - Cross-Site Request Forgery
This hub clusters every indexed record for Maspik – Ultimate Spam Protection so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
These recent records surface the CVE strings, patch cues, and direct report links most operators need first.
The Maspik plugin for WordPress is vulnerable to Missing Authorization in version 2.5.6 and prior. This is due to missing capability checks on the Maspik_spamlog_download_csv function. This...
The Maspik – Ultimate Spam Protection plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.6. This is due to missing or incorrect nonce...
The Maspik – Advanced Spam Protection plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.7. This is due to missing or incorrect nonce...
Sorted by latest disclosure date so newly published issues surface first.
The Maspik plugin for WordPress is vulnerable to Missing Authorization in version 2.5.6 and prior. This is due to missing capability checks on the Maspik_spamlog_download_csv function. This makes it possible for authenticated attackers, with subscriber-level access and above, to...
The Maspik – Ultimate Spam Protection plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.6. This is due to missing or incorrect nonce validation on the clear_log function. This makes it possible for unauthenticated attackers...
The Maspik – Advanced Spam Protection plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.7. This is due to missing or incorrect nonce validation on one of its functions. This makes it possible for unauthenticated attackers t...
The Maspik – Spam Blacklist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admini...
The Maspik – Spam Blacklist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 0.10.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admin...
The Maspik – Spam Blacklist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the efas_add_to_log function in all versions up to, and including, 0.9.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attack...
The Maspik – Spam Blacklist plugin for WordPress is vulnerable to IP Filtering Bypass in all versions up to, and including, 0.10.3 due to insufficient IP address validation. This makes it possible for unauthenticated attackers to bypass IP-based restrictions.
The Maspik plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.7.8. This is due to missing or incorrect nonce validation in the file /admin/partials/contact-forms-anti-spam-log.php. This makes it possible for unauthenticated attack...