Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 13 Nov 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 13 Nov 2025 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 23 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
ssvc
|
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Wed, 22 Oct 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 22 Oct 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deserialization of Untrusted Data vulnerability in wpshuffle Subscribe to Download subscribe-to-download allows Object Injection.This issue affects Subscribe to Download: from n/a through <= 2.0.9. | |
| Title | WordPress Subscribe to Download plugin <= 2.0.9 - PHP Object Injection vulnerability | |
| Weaknesses | CWE-502 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2025-11-13T10:33:44.800Z
Reserved: 2025-09-25T15:34:33.695Z
Link: CVE-2025-60224
Updated: 2025-10-22T20:38:39.912Z
Status : Awaiting Analysis
Published: 2025-10-22T15:15:59.497
Modified: 2025-11-13T11:16:50.527
Link: CVE-2025-60224
No data.
OpenCVE Enrichment
Updated: 2025-10-23T09:59:09Z