This can happen and it’s usually down to the data coming from the vulnerability provider.
In some cases, a CVE does list the vulnerable versions, but does not specify which version the issue was fixed in. When that “fixed in” information is missing, MainWP can’t reliably determine whether your installed version is safe, even if it’s newer.
To check this properly, can you let us know:
Which vulnerability service you’re using (NVD or WPScan)?
The exact CVE ID that’s being reported for Greenshift?
Thank you for the details, it makes sense, i didn’t realize the version the vulnerability is fixxed in is necessary to compare if the service is able to.
I’m using the NVD API.
Not sure about the CVE ID for my alert, here’s the details if meaningful:
5 February 2026 15 03 16 02162
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the greenshift_app_pass_validation() function in all versions up to, and including, 12.5.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve global plugin settings including stored AI API keys.
And at this time, the NVD does not return information about the version in which this CVE is fixed and that is the reason why our add-on still reports it as vulnerable.
So if it indeed fixed, feel free to Ignore that vulnerability in our add-on.
This topic was automatically closed 2 days after the last reply. New replies are no longer allowed.
WordPress® is a registered trademark of the WordPress Foundation, and WooCommerce® is a registered trademark of WooCommerce, Inc. MainWP is an independent product and is not affiliated, associated, or endorsed by the WordPress Foundation, WooCommerce, Inc., or Automattic Inc., except where noted under the Jetpack® API and Trademark License Agreement. All product names, logos, and brands are property of their respective owners and are used for identification purposes only.