Goprayer Goprayer

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Goprayer product.

RSS Feeds for Goprayer security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Goprayer products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Goprayer Sorted by Most Security Vulnerabilities since 2018

Goprayer Wp Prayer8 vulnerabilities

Goprayer Prayer2 vulnerabilities

By the Year

In 2026 there have been 0 vulnerabilities in Goprayer. Goprayer did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 5 6.55
2023 3 4.55
2022 0 0.00
2021 1 5.40

It may take a day or so for new Goprayer vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Goprayer Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2024-4751 Jun 14, 2024
WP Prayer II Plugin 2.4.7 lacks CSRF check Admin setting tampering The WP Prayer II WordPress plugin through 2.4.7 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Wp Prayer
Prayer
CVE-2024-4480 Jun 14, 2024
WP Prayer II Plugin 2.4.7 CSRF in Email Settings Update The WP Prayer II WordPress plugin through 2.4.7 does not have CSRF check in place when updating its email settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Prayer
CVE-2024-3407 May 15, 2024
WP Prayer CSRF Vulnerability <2.0.9: LoggedIn Users The WP Prayer WordPress plugin through 2.0.9 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks
Wp Prayer
CVE-2024-3406 May 15, 2024
WP Prayer 2.0.9 Missing CSRF Check on Email Settings Update The WP Prayer WordPress plugin through 2.0.9 does not have CSRF check in place when updating its email settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Wp Prayer
CVE-2024-3405 May 15, 2024
WP Prayer 2.0.9 CSRF VULN: Unprotected Settings Update The WP Prayer WordPress plugin through 2.0.9 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Wp Prayer
CVE-2021-4412 Jul 12, 2023
CVE-2021-4412 WP Prayer <=1.6.5 XSRF in save/export The WP Prayer plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.5. This is due to missing or incorrect nonce validation on the save() and export() functions. This makes it possible for unauthenticated attackers to save plugin settings and trigger a data export via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Wp Prayer
CVE-2021-4342 Jun 07, 2023
Common Vulnerability in unspecified software (CVE-2021-4342) ** REJECT ** CVE split into individual CVE IDs for each software record.
Wp Prayer
CVE-2023-25705 Apr 07, 2023
WP Prayer plugin <=1.9.6 Admin+ Authenticated Stored XSS Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Go Prayer WP Prayer plugin <= 1.9.6 versions.
Wp Prayer
CVE-2021-24313 Jun 01, 2021
The WP Prayer WordPress plugin before 1.6.2 provides the functionality to store requested prayers/praises and list them on a WordPress website The WP Prayer WordPress plugin before 1.6.2 provides the functionality to store requested prayers/praises and list them on a WordPress website. These stored prayer/praise requests can be listed by using the WP Prayer engine. An authenticated WordPress user with any role can fill in the form to request a prayer. The form to request prayers or praises have several fields. The 'prayer request' and 'praise request' fields do not use proper input validation and can be used to store XSS payloads.
Wp Prayer
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.