What this page helps you verify fast
This hub clusters every indexed record for RokStories so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
Review known vulnerability records for the WordPress plugin RokStories (`wp_rokstories`), including severity, CVE references, affected versions, and patch status.
This hub clusters every indexed record for RokStories so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
These recent records surface the CVE strings, patch cues, and direct report links most operators need first.
The WordPress RokStories plugin is vulnerable to Denial of Service via the 'src' parameter in the 'thumb.php' file in versions up to, and including, 1.25. This makes it possible for unauthen...
The RokStories plugin for WordPress is vulnerable to Full Path Disclosure in versions up to, and including, 1.25 via the 'src' parameter in the 'thumb.php' and 'rokstories.php' files. This c...
The RokStories plugin for WordPress is vulnerable to Cross-Site Scripting via the 'src' parameter in the 'thumb.php' file in versions up to, and including, 1.25 due to insufficient input san...
Sorted by latest disclosure date so newly published issues surface first.
The WordPress RokStories plugin is vulnerable to Denial of Service via the 'src' parameter in the 'thumb.php' file in versions up to, and including, 1.25. This makes it possible for unauthenticated attackers to slow the response time of the vulnerable service to an unusable speed...
The RokStories plugin for WordPress is vulnerable to Full Path Disclosure in versions up to, and including, 1.25 via the 'src' parameter in the 'thumb.php' and 'rokstories.php' files. This can allow unauthenticated attackers to extract otherwise restricted system file paths.
The RokStories plugin for WordPress is vulnerable to Cross-Site Scripting via the 'src' parameter in the 'thumb.php' file in versions up to, and including, 1.25 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inj...
The RokStories plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'src' parameter in the 'thumb.php' file in versions up to, and including, 1.25. This makes it possible for unauthenticated attackers to upload arbitrary files on...
The WordPress RokStories plugin is vulnerable to Abuse of Functionality via the 'src' parameter in the 'thumb.php' file in versions up to, and including, 1.25. This makes it possible for unauthenticated attackers to use implemented functions for unintended/malicious reasons.