A vulnerability categorized as critical has been discovered in Tosei Online Store Management System ネット店舗管理システム 1.01. The affected element is an unknown function of the file /cgi-bin/imode_alldata.php. Executing a manipulation of the argument DevId can lead to command injection.
This vulnerability is handled as CVE-2026-1192. The attack can be executed remotely. Additionally, an exploit exists.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability classified as problematic has been found in Bjskzy Zhiyou ERP up to 11.0. Impacted is the function initRCForm of the file RichClientService.class of the component com.artery.richclient.RichClientService. Performing a manipulation results in xml external entity reference.
This vulnerability is reported as CVE-2026-1218. The attack is possible to be carried out remotely. Moreover, an exploit is present.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability described as problematic has been identified in Skillate Plugin up to 1.2.10 on WordPress. This issue affects some unknown processing. Such manipulation leads to cross site scripting.
This vulnerability is documented as CVE-2026-22329. The attack can be executed remotely. There is not any exploit available.
A vulnerability marked as problematic has been reported in Hide My WP Plugin up to 6.2.12 on WordPress. This vulnerability affects unknown code. This manipulation causes cross site scripting.
This vulnerability is registered as CVE-2025-69098. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability labeled as problematic has been found in KenthaRadio Plugin up to 2.2.0 on WordPress. This affects an unknown part. The manipulation results in cross site scripting.
This vulnerability is cataloged as CVE-2025-69003. The attack may be launched remotely. There is no exploit available.
A vulnerability identified as problematic has been detected in JNews Plugin up to 11.0.2 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2025-68906. The attack may be initiated remotely. There is no available exploit.
A vulnerability categorized as critical has been discovered in Workreap Core Plugin up to 3.4.0 on WordPress. Affected by this vulnerability is an unknown functionality. Executing a manipulation can lead to improper authentication.
This vulnerability is tracked as CVE-2025-69101. The attack can be launched remotely. No exploit exists.
A vulnerability was found in Reservation Plugin up to 1.7 on WordPress. It has been rated as critical. Affected is an unknown function of the component Setting Handler. Performing a manipulation results in missing authorization.
This vulnerability is identified as CVE-2025-69095. The attack can be initiated remotely. There is not any exploit available.
A vulnerability was found in Peach Payments Gateway Plugin up to 3.3.6 on WordPress. It has been declared as critical. This impacts an unknown function. Such manipulation leads to missing authorization.
This vulnerability is referenced as CVE-2025-67942. It is possible to launch the attack remotely. No exploit is available.
A vulnerability was found in Tickera Plugin up to 3.5.6.2 on WordPress. It has been classified as critical. This affects an unknown function. This manipulation causes missing authorization.
The identification of this vulnerability is CVE-2025-67939. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability was found in Miion Plugin up to 1.2.7 on WordPress and classified as critical. The impacted element is an unknown function. The manipulation results in unrestricted upload.
This vulnerability was named CVE-2025-68986. The attack may be performed from remote. There is no available exploit.
A vulnerability has been found in g-FFL Checkout Plugin up to 2.1.0 on WordPress and classified as critical. The affected element is an unknown function. The manipulation leads to unrestricted upload.
This vulnerability is uniquely identified as CVE-2025-68001. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability, which was classified as problematic, was found in Shown Connector Plugin up to 1.2.10 on WordPress. Impacted is an unknown function of the component Setting Handler. Executing a manipulation can lead to missing authorization.
This vulnerability is handled as CVE-2025-68003. The attack can be executed remotely. There is not any exploit available.
A vulnerability, which was classified as critical, has been found in Blogzee Plugin up to 1.0.5 on WordPress. This issue affects some unknown processing. Performing a manipulation results in unrestricted upload.
This vulnerability is known as CVE-2025-68910. Remote exploitation of the attack is possible. No exploit is available.
A vulnerability classified as problematic was found in Event Espresso Plugin up to 5.0.37.decaf on WordPress. This vulnerability affects unknown code of the component Setting Handler. Such manipulation leads to missing authorization.
This vulnerability is traded as CVE-2025-68007. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as critical has been found in Blogistic Plugin up to 1.0.5 on WordPress. This affects an unknown part. This manipulation causes unrestricted upload.
This vulnerability appears as CVE-2025-68909. The attack may be initiated remotely. There is no available exploit.
A vulnerability described as critical has been identified in Anona Plugin up to 8.0 on WordPress. Affected by this issue is some unknown functionality. The manipulation results in path traversal.
This vulnerability is reported as CVE-2025-68902. The attack can be launched remotely. No exploit exists.
A vulnerability marked as critical has been reported in Woocommerce Book Price Plugin up to 1.3 on WordPress. Affected by this vulnerability is an unknown functionality. The manipulation leads to path traversal.
This vulnerability is documented as CVE-2026-22334. The attack can be initiated remotely. There is not any exploit available.