WhisperX tag archive

#plugin

This page collects WhisperX intelligence signals tagged #plugin. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (3)

The Lab · 2026-04-04 11:27:00 · GitHub Issues

1. Plugin Security Alert: High-Risk XSS Vulnerability in Bundled pdf.js Library (CVE-2024-4367)

A widely used plugin has been flagged for bundling a critically vulnerable version of the pdf.js library, exposing installations to a high-severity cross-site scripting (XSS) attack vector. The vulnerability, tracked as CVE-2024-4367, is present in the plugin's version 0.16.0 and was detected by security scanning tools...

The Lab · 2026-05-07 05:31:37 · GitHub Issues

2. WordPress Notice Tracker Plugin Flaw Turns Third-Party XSS Into Site-Wide Amplification Risk

A vulnerability in the WordPress plugin Notice Tracker creates a mechanism by which stored cross-site scripting (XSS) vulnerabilities in other installed plugins can be amplified into persistent attacks affecting an entire WordPress installation. The flaw, documented as CVE candidates under CWE-79, centers on unescaped ...

The Lab · 2026-05-12 00:48:21 · BleepingComputer Echo RSS

3. Checkmarx Jenkins Plugin Spoofed on Marketplace, Infostealer Variant Distributed to Developers

Checkmarx has confirmed that a malicious version of its Jenkins Application Security Testing (AST) plugin was published on the official Jenkins Marketplace, exposing software developers who downloaded the rogue package to infostealer malware. The company issued a warning over the weekend after identifying the fraudulen...