The Beginning

I started my journey in CVE hunting in late 2022. My friend Rafshanzani Suhada introduced me to how to report a WordPress plugin vulnerability to WPScan. And then, CVE-2022-3074 became my first-ever CVE.

After my first CVE was published, I conducted some research on open-source projects on GitHub and discovered a Host Header Injection vulnerability in Feehi CMS, which was assigned CVE-2022-38796.

Massive Hunt at 2023

In 2023, I conducted a massive hunt on WordPress plugins, creating a bot to detect vulnerabilities in them, and then reported the issues through Patchstack. During that year, I obtained more than 100 CVEs.

This is some CVE i found in 2023.

WordPress Plugins

CVE ID Title
CVE-2022-3074 Slider Hero < 8.4.4 - Admin+ Stored Cross-Site Scripting
CVE-2023-22714 Coming Soon by Supsystic <= 1.7.10 Cross Site Request Forgery
CVE-2023-23718 Page Loading Effects <= 2.0.0 - Admin+ Stored Cross-Site Scripting
CVE-2023-23864 Very Simple Google Maps <= 2.8.4 Contributor+ Cross-Site Scripting
CVE-2023-23728 WP Flipclock <= 1.7.4 - Contributor+ Cross-Site Scripting
CVE-2023-23989 RegistrationMagic <= 5.1.9.2 - Unauthenticated HTML Injection
CVE-2023-23722 WP eBay Product Feeds <= 3.3.1 - Admin+ Stored Cross-Site Scripting
CVE-2023-23895 WP Time Slots Booking Form <= 1.1.82 - Broken Access Control
CVE-2023-23976 RegistrationMagic <= 5.1.9.2 - Improper Authorization to Price Change
CVE-2023-23979 Quick Event Manager <= 9.7.4 - Unauthenticated Stored Cross Site Scripting
CVE-2023-24379 WordPress Landing Page Builder <= 3.1.9.8 Editor+ Local File Inclusion

Wordfence

More published CVE at my Wordfence profile.

Other Open Source Project

CVE ID Title
CVE-2022-38796 Feehi CMS 2.1.1 Host Header Injection
CVE-2022-46074 Helmet Store Showroom v1.0 Login Page SQL Injection
CVE-2022-46443 Bang Resto v1.0 Authenticated SQL Injection
CVE-2023-24320 Axcora POS #0~gitf77ec09 Broken Authentication

And many more.

Whats Next?

Well, this year, I decided to prioritize quality over quantity. I am focusing on hunting CVEs in popular projects or searching specifically for critical or high-severity vulnerabilities only.