Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

wpdeveloper

About This Vendor

wpdeveloper is a technology vendor producing software and infrastructure products. As a software provider, wpdeveloper's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of wpdeveloper's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 136 known vulnerabilities from wpdeveloper. This includes 7 critical-severity issues and 19 high-severity issues that represent significant risk. These vulnerabilities affect 13 distinct products across wpdeveloper's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2019 through 2025, reflecting sustained security scrutiny over multiple years. Organizations deploying wpdeveloper products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2017-18503 2019-08-12 2024-11-21 6.1 4.3 Likely
CVE-2017-18504 2019-08-12 2024-11-21 8.8 6.8 Likely
CVE-2021-24255 2021-05-05 2024-11-21 5.4 3.5 Unknown
CVE-2021-24352 2021-06-14 2024-11-21 8.8 6.8 Likely
CVE-2021-24353 2021-06-14 2024-11-21 8.8 6.8 Likely
CVE-2021-24354 2021-06-14 2024-11-21 8.8 6.5 Likely
CVE-2021-24355 2021-06-14 2024-11-21 4.3 4.0 Likely
CVE-2021-24356 2021-06-14 2024-11-21 8.8 6.5 Likely
CVE-2021-24633 2021-09-27 2024-11-21 4.3 4.0 Likely
CVE-2021-24812 2021-11-23 2024-11-21 5.4 3.5 Unknown
CVE-2022-0320 2022-02-01 2024-11-21 9.8 7.5 Likely
CVE-2022-0683 2022-02-24 2024-11-21 6.1 4.3 Likely
CVE-2022-0349 2022-03-07 2024-11-21 9.8 7.5 Likely
CVE-2023-26325 2023-02-23 2024-11-21 8.8 - -
CVE-2023-32243 2023-05-12 2024-11-21 9.8 - -
CVE-2023-2833 2023-06-06 2024-11-21 8.8 - -
CVE-2023-2083 2023-06-09 2024-11-21 4.3 - -
CVE-2023-2084 2023-06-09 2024-11-21 4.3 - -
CVE-2023-2085 2023-06-09 2024-11-21 4.3 - -
CVE-2023-2086 2023-06-09 2024-11-21 4.3 - -
CVE-2023-2087 2023-06-09 2024-11-21 4.3 - -
CVE-2023-3371 2023-06-27 2024-11-21 5.3 - -
CVE-2020-36744 2023-07-01 2024-11-21 4.3 - -
CVE-2023-3779 2023-07-20 2024-11-21 5.3 - -
CVE-2023-4282 2023-08-10 2024-11-21 5.4 - -
CVE-2023-4283 2023-08-10 2024-11-21 6.4 - -
CVE-2023-32241 2023-08-29 2024-11-21 7.1 - -
CVE-2023-4402 2023-10-20 2024-11-21 8.1 - -
CVE-2023-4386 2023-10-20 2024-11-21 8.1 - -
CVE-2022-46809 2023-11-07 2024-11-21 9.8 - -
CVE-2023-32245 2023-11-18 2024-11-21 5.4 - -
CVE-2023-5749 2023-12-11 2024-11-21 6.1 - -
CVE-2023-5750 2023-12-11 2024-11-21 6.1 - -
CVE-2023-49184 2023-12-15 2024-11-21 5.9 - -
CVE-2023-6986 2024-01-03 2024-11-21 6.4 - -
CVE-2023-7044 2024-01-04 2024-11-21 6.4 - -
CVE-2023-7071 2024-01-11 2025-06-03 6.4 - -
CVE-2023-6623 2024-01-15 2025-06-11 9.8 - -
CVE-2024-0585 2024-02-05 2024-11-21 5.4 - -
CVE-2024-0586 2024-02-05 2024-11-21 6.5 - -
CVE-2024-0954 2024-02-05 2024-11-21 6.4 - -
CVE-2024-1698 2024-02-27 2025-03-10 9.8 - -
CVE-2024-1171 2024-02-29 2025-01-08 5.4 - -
CVE-2024-1172 2024-02-29 2025-01-08 5.4 - -
CVE-2024-1236 2024-02-29 2025-01-08 6.4 - -
CVE-2024-1276 2024-02-29 2025-01-08 6.4 - -
CVE-2024-1349 2024-02-29 2024-12-31 6.4 - -
CVE-2024-1425 2024-02-29 2024-12-31 6.4 - -
CVE-2024-2128 2024-03-07 2025-01-07 6.4 - -
CVE-2024-1802 2024-03-07 2025-01-07 6.4 - -
CVE-2024-1536 2024-03-13 2025-01-08 7.4 - -
CVE-2024-1537 2024-03-13 2025-01-08 6.4 - -
CVE-2024-1854 2024-03-13 2025-01-22 6.4 - -
CVE-2024-2255 2024-03-20 2025-01-27 6.4 - -
CVE-2024-2468 2024-03-23 2025-01-07 6.4 - -
CVE-2024-2688 2024-03-23 2025-01-07 5.4 - -
CVE-2024-29812 2024-03-27 2025-05-13 6.5 - -
CVE-2024-30226 2024-03-28 2026-01-23 9.0 - -
CVE-2024-3018 2024-03-30 2025-01-08 8.8 - -
CVE-2024-3245 2024-04-06 2025-01-07 6.4 - -
CVE-2024-31306 2024-04-07 2025-01-22 6.5 - -
CVE-2024-2623 2024-04-09 2025-01-08 6.4 - -
CVE-2024-2650 2024-04-09 2025-01-08 6.4 - -
CVE-2024-2974 2024-04-09 2025-01-08 5.3 - -
CVE-2024-3244 2024-04-09 2025-01-07 6.4 - -
CVE-2024-3333 2024-04-17 2025-01-08 6.4 - -
CVE-2024-3818 2024-04-19 2025-01-21 5.4 - -
CVE-2024-3645 2024-04-22 2025-01-10 6.4 - -
CVE-2024-3733 2024-04-25 2025-01-10 5.3 - -
CVE-2024-3728 2024-05-02 2025-01-08 6.4 - -
CVE-2024-4003 2024-05-02 2025-01-15 6.4 - -
CVE-2024-4156 2024-05-02 2025-01-15 6.4 - -
CVE-2024-33921 2024-05-03 2025-06-10 4.3 - -
CVE-2024-4275 2024-05-14 2025-01-15 6.4 - -
CVE-2024-4316 2024-05-14 2025-01-07 6.4 - -
CVE-2024-4448 2024-05-14 2025-01-15 6.5 - -
CVE-2024-4449 2024-05-14 2025-01-15 6.4 - -
CVE-2024-4624 2024-05-14 2025-01-15 6.4 - -
CVE-2024-3609 2024-05-16 2025-06-27 4.3 - -
CVE-2023-41955 2024-05-17 2025-03-06 8.8 - -
CVE-2024-4891 2024-05-18 2025-01-30 6.4 - -
CVE-2024-1803 2024-05-23 2025-01-07 4.3 - -
CVE-2024-5086 2024-05-29 2025-03-01 6.4 - -
CVE-2024-5073 2024-05-30 2025-01-15 6.4 - -
CVE-2024-5571 2024-06-05 2024-11-21 6.4 - -
CVE-2024-5188 2024-06-06 2024-11-21 6.4 - -
CVE-2024-5612 2024-06-07 2024-11-21 6.4 - -
CVE-2024-30467 2024-06-09 2024-11-21 6.5 - -
CVE-2024-31274 2024-06-09 2024-11-21 5.3 - -
CVE-2024-31284 2024-06-09 2024-11-21 6.5 - -
CVE-2024-5189 2024-06-11 2025-01-15 6.4 - -
CVE-2024-1565 2024-06-13 2024-11-21 6.4 - -
CVE-2024-5058 2024-06-21 2024-11-21 6.5 - -
CVE-2023-51375 2024-06-21 2024-11-21 4.3 - -
CVE-2024-39649 2024-08-01 2025-03-01 6.5 - -
CVE-2024-5595 2024-08-02 2025-04-11 5.4 - -
CVE-2024-43227 2024-08-12 2026-01-23 6.5 - -
CVE-2024-7092 2024-08-13 2025-01-08 6.4 - -
CVE-2024-43129 2024-08-13 2024-09-12 6.5 - -
CVE-2024-43328 2024-08-19 2025-04-05 8.3 - -
CVE-2024-43936 2024-08-29 2024-09-03 6.5 - -
CVE-2024-8440 2024-09-11 2024-09-25 6.4 - -
CVE-2024-8742 2024-09-13 2024-09-27 6.4 - -
CVE-2024-47385 2024-10-05 2025-04-11 6.5 - -
CVE-2021-4446 2024-10-16 2025-01-10 6.3 - -
CVE-2021-4447 2024-10-16 2025-01-10 8.8 - -
CVE-2024-50461 2024-10-28 2024-11-13 6.5 - -
CVE-2024-38707 2024-11-01 2025-03-24 6.3 - -
CVE-2024-43323 2024-11-01 2024-11-19 5.3 - -
CVE-2024-51672 2024-11-04 2024-11-06 7.6 - -
CVE-2024-8961 2024-11-15 2024-11-19 6.4 - -
CVE-2024-8978 2024-11-15 2024-11-19 5.7 - -
CVE-2024-8979 2024-11-15 2024-11-19 8.0 - -
CVE-2024-11203 2024-11-28 2025-04-11 6.4 - -
CVE-2023-47760 2024-12-09 2025-01-22 4.3 - -
CVE-2023-47762 2024-12-09 2026-01-23 4.3 - -
CVE-2023-51359 2024-12-09 2025-01-22 5.4 - -
CVE-2023-51360 2024-12-09 2025-01-22 6.5 - -
CVE-2022-47594 2024-12-13 2025-04-11 6.5 - -
CVE-2023-40670 2024-12-13 2025-06-27 4.3 - -
CVE-2024-56063 2024-12-31 2025-03-06 6.5 - -
CVE-2023-45104 2025-01-02 2026-01-23 7.3 - -
CVE-2025-22315 2025-01-07 2026-01-23 6.5 - -
CVE-2024-12045 2025-01-08 2025-04-17 4.4 - -
CVE-2025-22683 2025-02-03 2026-01-23 6.5 - -
CVE-2025-26871 2025-02-25 2025-04-10 4.3 - -
CVE-2024-13803 2025-02-26 2025-04-10 6.4 - -
CVE-2025-1664 2025-03-08 2025-03-11 6.4 - -
CVE-2025-39589 2025-04-16 2026-01-28 4.3 - -
CVE-2025-39590 2025-04-16 2026-01-28 6.5 - -
CVE-2025-24752 2025-04-17 2026-01-26 7.1 - -
CVE-2024-9993 2025-06-07 2025-07-14 6.4 - -
CVE-2024-9994 2025-06-07 2025-07-14 6.4 - -
CVE-2025-6244 2025-07-08 2025-07-09 6.4 - -
CVE-2025-64352 2025-10-31 2026-01-29 2.7 - -
CVE-2025-69092 2025-12-30 2026-01-29 6.5 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for wpdeveloper by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with wpdeveloper's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.