Plugin Vulnerability Hub
Plugin 7 known issues Latest disclosed Jul 09, 2025

Gwolle Guestbook Vulnerabilities

Review known vulnerability records for the WordPress plugin Gwolle Guestbook (`gwolle-gb`), including severity, CVE references, affected versions, and patch status.

Known Records
7
High or Critical
2
Linked CVEs
5
Last Updated
Jul 10, 2025
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for Gwolle Guestbook so operators can quickly confirm whether a disclosed issue maps to the installed slug and version range.

Patch Visibility
7 records include a published patch path.
Severity Mix
1 critical and 1 high severity finding.
Reference Workflow
Jump from the hub into the full report when you need remediation notes, CVSS vector details, or source references.
Known Vulnerabilities

Reports for Gwolle Guestbook

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2025-5807
Gwolle Guestbook <= 4.9.2 - Unauthenticated Stored Cross-Site Scripting via `gwolle_gb_content` Parameter

The Gwolle Guestbook plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘gwolle_gb_content’ parameter in all versions up to, and including, 4.9.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attacker...

Published
Jul 09, 2025
Patched Release
4.9.3
Affected Versions
Versions up to 4.9.2
Next Step
Update to 4.9.3 or newer if supported.
Plugin Medium Patched: Yes CVE-2025-24710
Gwolle Guestbook <= 4.7.1 - Reflected Cross-Site Scripting

The Gwolle Guestbook plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 4.7.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pa...

Published
Jan 31, 2025
Patched Release
4.7.2
Affected Versions
Versions up to 4.7.1
Next Step
Update to 4.7.2 or newer if supported.
Plugin Medium Patched: Yes CVE-2021-24980
Gwolle Guestbook <= 4.1.2 - Reflected Cross-Site Scripting

The Gwolle Guestbook WordPress plugin before 4.2.0 does not sanitise and escape the gwolle_gb_user_email parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting issue in an admin page

Published
Nov 23, 2021
Patched Release
4.2
Affected Versions
Versions up to 4.1.2
Next Step
Update to 4.2 or newer if supported.
Plugin Medium Patched: Yes CVE-2018-17884
Gwolle Guestbook <= 2.5.3 - Cross-Site Scripting

XSS exists in admin/gb-dashboard-widget.php in the Gwolle Guestbook (gwolle-gb) plugin before 2.5.4 for WordPress via the PATH_INFO to wp-admin/index.php

Published
Jul 28, 2018
Patched Release
2.5.4
Affected Versions
Versions up to 2.5.3
Next Step
Update to 2.5.4 or newer if supported.
Plugin High Patched: Yes
Gwolle Guestbook <= 2.1.0 - Cross-Site Request Forgery

The Gwolle Guestbook plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.1.0. This is due to missing or incorrect nonce validation on the wp-nonces. This makes it possible for unauthenticated attackers to mass approve denied entrie...

Published
Mar 01, 2017
Patched Release
2.1.1
Affected Versions
Versions up to 2.1.0
Next Step
Update to 2.1.1 or newer if supported.
Plugin Medium Patched: Yes
Gwolle Guestbook <= 2.1.0 - Stored Cross-Site Scripting

The Gwolle Guestbook plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘/gwolle-gb/admin/page-editor.php’ file in versions up to, and including, 2.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated at...

Published
Mar 01, 2017
Patched Release
2.1.1
Affected Versions
Versions up to 2.1.0
Next Step
Update to 2.1.1 or newer if supported.
Plugin Critical Patched: Yes CVE-2015-8351
Gwolle Guestbook <= 1.5.3 - Remote File Inclusion

PHP remote file inclusion vulnerability in the Gwolle Guestbook plugin before 1.5.4 for WordPress, when allow_url_include is enabled, allows remote authenticated users to execute arbitrary PHP code via a URL in the abspath parameter to frontend/captcha/ajaxresponse.php. NOTE: thi...

Published
Nov 04, 2015
Patched Release
1.5.4
Affected Versions
Versions before 1.5.4
Next Step
Update to 1.5.4 or newer if supported.