Post

My Journey in CVE Research: From Discovery to Disclosure

My Journey in CVE Research: From Discovery to Disclosure

Introduction

Researching software vulnerabilities and contributing to the CVE ecosystem is both a technical challenge and a responsibility. This post highlights my personal experience in vulnerability research—how I discovered flaws, validated them safely, and worked through the disclosure process that eventually led to public CVE assignments.


Why I Pursue CVE Research

My motivation stems from three key goals:

  1. Improving security in widely used applications.
  2. Challenging myself through real-world vulnerability hunting.
  3. Contributing to the community by documenting findings publicly in CVE databases, Exploit-DB, and security advisories.

Each CVE is not just a number; it reflects effort, analysis, communication, and a contribution toward a safer ecosystem.


Research Approach

Here’s the typical workflow I follow when hunting vulnerabilities:

  1. Reconnaissance & Inventory
    Identify application versions, plugins, and changelogs—especially outdated or unpatched components.

  2. Input Analysis
    Map input vectors such as id parameters, form fields, or embedded content options.

  3. Proof-of-Concept (Non-Destructive)
    Craft controlled payloads to safely confirm the existence of flaws (e.g., blind SQLi timing, harmless XSS markers).

  4. Manual Verification
    Cross-check results to avoid false positives and gather reproducible evidence.

  5. Responsible Disclosure
    Contact vendors, share detailed steps, and allow remediation time before public release or CVE request.


Selected Research Outcomes

Below are some of my published findings, with direct links to Exploit-DB and WPScan entries.

Exploit-DB Publications

CVE Publications (via WPScan)


Key Lessons Learned

  • Clear documentation accelerates vendor response.
  • Manual review is essential to confirm findings from automated scans.
  • Responsible disclosure builds trust and ensures vulnerabilities are patched safely.
  • Patience pays off—from discovery to CVE publication can be a lengthy process.

Conclusion

CVE research is about persistence, responsibility, and contributing back to the community. Every published CVE is a small step toward better security for everyone. My journey continues, and I hope sharing this process helps aspiring security researchers understand not only the how but also the why of vulnerability disclosure.


This post is licensed under CC BY 4.0 by the author.