Warfareplugins Warfareplugins

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Warfareplugins product.

RSS Feeds for Warfareplugins security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Warfareplugins products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Warfareplugins Sorted by Most Security Vulnerabilities since 2018

By the Year

In 2026 there have been 0 vulnerabilities in Warfareplugins. Last year, in 2025 Warfareplugins had 1 security vulnerability published. Right now, Warfareplugins is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 1 0.00
2024 1 9.80
2023 3 5.40
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 1 6.10

It may take a day or so for new Warfareplugins vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Warfareplugins Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2025-26973 Feb 22, 2025
DOM-based XSS in WarfarePlugins Social Warfare up to v4.5.4 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WarfarePlugins Social Warfare allows DOM-Based XSS. This issue affects Social Warfare: from n/a through 4.5.4.
Social Warfare
CVE-2021-4434 Jan 17, 2024
Remote Code Execution in WP Social Warfare 3.5.2 via swp_url The Social Warfare plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 3.5.2 via the 'swp_url' parameter. This allows attackers to execute code on the server.
Social Warfare
CVE-2023-4842 Nov 07, 2023
Social Warfare WP Plugin: Stored XSS via social_warfare Shortcode (4.4.3) The Social Sharing Plugin - Social Warfare plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'social_warfare' shortcode in versions up to, and including, 4.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Social Warfare
CVE-2023-0403 Jan 19, 2023
Social Warfare <4.4.0 WP Plugin: Unauth CSRF Deleting Post Meta The Social Warfare plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.4.0. This is due to missing or incorrect nonce validation on several AJAX actions. This makes it possible for unauthenticated attackers to delete post meta information and reset network access tokens, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Social Warfare
CVE-2023-0402 Jan 19, 2023
Social Warfare WP Plugin <=4.3.0 Auth Bypass via AJAX Capability Check The Social Warfare plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several AJAX actions in versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete post meta information and reset network access tokens.
Social Warfare
CVE-2019-9978 Mar 24, 2019
The social-warfare plugin before 3.5.3 for WordPress has stored XSS The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro.
Social Warfare
Social Warfare Pro
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.