What this page helps you verify fast
This hub clusters every indexed record for Reality | Estate Multipurpose WordPress Theme so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
Review known vulnerability records for the WordPress theme Reality | Estate Multipurpose WordPress Theme (`reality`), including severity, CVE references, affected versions, and patch status.
This hub clusters every indexed record for Reality | Estate Multipurpose WordPress Theme so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.
These recent records surface the CVE strings, patch cues, and direct report links most operators need first.
The Reality | Estate Multipurpose WordPress Theme theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'label' & 'tab' parameters in versions up to, and including, 2.5...
The Reality theme for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping on the 'key...
The Reality theme for WordPress is vulnerable to Stored Cross-Site Scripting via the property and user pages in versions up to, and including, 2.3.0 due to insufficient input sanitization an...
Sorted by latest disclosure date so newly published issues surface first.
The Reality | Estate Multipurpose WordPress Theme theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'label' & 'tab' parameters in versions up to, and including, 2.5.3 due to insufficient input sanitization and output escaping. This makes it possible for...
The Reality theme for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping on the 'keyword' parameter. This makes it possible for unauthenticated attackers to inject arbitrary...
The Reality theme for WordPress is vulnerable to Stored Cross-Site Scripting via the property and user pages in versions up to, and including, 2.3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary...