Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,193
Critical182
High650
Medium2,337
Reset
Showing 1881-1900 of 3193 records
Threat Entry Updated 2025-03-13

CVE-2024-7857 - Changeset Plugin

The Media Library Folders plugin for WordPress is vulnerable to second order SQL Injection via the 'sort_type' parameter of the 'mlf_change_sort_type' AJAX action in all versions up to, and including, 8.2.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Changeset

CVE-2024-7857

CRITICAL CVSS 9.8 2024-08-29
Threat Entry Updated 2024-09-13

CVE-2024-8195 - Changeset Plugin

The Permalink Manager Lite plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'debug_data', 'debug_query', and 'debug_redirect' functions in all versions up to, and including, 2.4.4. This makes it possible for unauthenticated attackers to extract sensitive data including password, title, and content of password-protected posts.

PLUGIN Changeset

CVE-2024-8195

MEDIUM CVSS 5.3 2024-08-28
Threat Entry Updated 2024-09-13

CVE-2024-7447 - Changeset Plugin

The Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'fnsf_af2_handel_file_upload' function in all versions up to, and including, 3.7.3.2. This makes it possible for unauthenticated attackers to upload arbitrary media to the site, even if no forms exist.

PLUGIN Changeset

CVE-2024-7447

MEDIUM CVSS 5.3 2024-08-28
Threat Entry Updated 2024-08-28

CVE-2024-7573 - Changeset Plugin

The Relevanssi Live Ajax Search plugin for WordPress is vulnerable to argument injection in all versions up to, and including, 2.4. This is due to insufficient validation of input supplied via POST data in the 'search' function. This makes it possible for unauthenticated attackers to inject arbitrary arguments into a WP_Query query and potentially expose sensitive information such as attachments or private posts.

PLUGIN Changeset

CVE-2024-7573

MEDIUM CVSS 5.3 2024-08-28
Threat Entry Updated 2024-08-30

CVE-2024-8200 - Changeset Plugin

The Reviews Feed – Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'update_api_key' function. This makes it possible for unauthenticated attackers to update an API key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Changeset

CVE-2024-8200

MEDIUM CVSS 4.3 2024-08-27
Threat Entry Updated 2024-08-30

CVE-2024-8199 - Changeset Plugin

The Reviews Feed – Add Testimonials and Customer Reviews From Google Reviews, Yelp, TripAdvisor, and More plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_api_key' function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update API Key options.

PLUGIN Changeset

CVE-2024-8199

MEDIUM CVSS 4.3 2024-08-27
Threat Entry Updated 2025-03-07

CVE-2024-7791 - Changeset Plugin

The 140+ Widgets | Xpro Addons For Elementor – FREE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘arrow’ parameter within the Post Grid widget in all versions up to, and including, 1.4.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Changeset

CVE-2024-7791

MEDIUM CVSS 6.4 2024-08-27
Threat Entry Updated 2024-08-27

CVE-2024-8046 - Changeset Plugin

The Logo Showcase Ultimate – Logo Carousel, Logo Slider & Logo Grid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Changeset

CVE-2024-8046

MEDIUM CVSS 6.4 2024-08-27
Threat Entry Updated 2024-09-12

CVE-2024-7304 - Changeset Plugin

The Ninja Tables – Easiest Data Table Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 5.0.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Changeset

CVE-2024-7304

MEDIUM CVSS 6.4 2024-08-27
Threat Entry Updated 2024-09-12

CVE-2024-6804 - Changeset Plugin

The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Changeset

CVE-2024-6804

MEDIUM CVSS 6.4 2024-08-27
Threat Entry Updated 2024-08-26

CVE-2024-7656 - Changeset Plugin

The Image Hotspot by DevVN plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.5 via deserialization of untrusted input in the 'devvn_ihotspot_shortcode_func' function. This makes it possible for authenticated attackers, with Author-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

PLUGIN Changeset

CVE-2024-7656

HIGH CVSS 8.8 2024-08-24
Threat Entry Updated 2024-09-26

CVE-2024-6499 - Changeset Plugin

The WordPress Button Plugin MaxButtons plugin for WordPress is vulnerable to information exposure in all versions up to, and including, 9.7.8. This makes it possible for unauthenticated attackers to obtain the full path to instances, which they may be able to use in combination with other vulnerabilities or to simplify reconnaissance work. On its own, this information is of very limited use.

PLUGIN Changeset

CVE-2024-6499

MEDIUM CVSS 5.3 2024-08-24
Threat Entry Updated 2024-09-12

CVE-2024-6631 - Changeset Plugin

The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several AJAX actions in all versions up to, and including, 3.1.14. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform unauthorized actions, such as updating plugin settings.

PLUGIN Changeset

CVE-2024-6631

MEDIUM CVSS 5.0 2024-08-24
Threat Entry Updated 2024-09-17

CVE-2024-8120 - Changeset Plugin

The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.14. This is due to missing or incorrect nonce validation on several functions in the class/class-image-otimizer.php file. This makes it possible for unauthenticated attackers to update plugin settings along with performing other actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Changeset

CVE-2024-8120

MEDIUM CVSS 4.7 2024-08-24
Threat Entry Updated 2024-09-26

CVE-2023-6987 - Changeset Plugin

The String locator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sql-column' parameter in all versions up to, and including, 2.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This required WP_DEBUG to be enabled in order to be exploited.

PLUGIN Changeset

CVE-2023-6987

MEDIUM CVSS 6.1 2024-08-24
Threat Entry Updated 2024-09-27

CVE-2023-0926 - Changeset Plugin

The Custom Permalinks plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.6.0 due to insufficient input sanitization and output escaping on tag names. This allows authenticated users, with editor-level permissions or greater to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, even when 'unfiltered_html' has been disabled.

PLUGIN Changeset

CVE-2023-0926

MEDIUM CVSS 4.4 2024-08-24
Threat Entry Updated 2024-09-12

CVE-2024-5502 - Changeset Plugin

The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Accordion, Dual Heading, and Vertical Timeline widgets in all versions up to, and including, 2.4.30 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Changeset

CVE-2024-5502

MEDIUM CVSS 6.4 2024-08-23
Threat Entry Updated 2024-09-27

CVE-2024-7258 - Changeset Plugin

The WooCommerce Google Feed Manager plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'wppfm_removeFeedFile' function in all versions up to, and including, 2.8.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Changeset

CVE-2024-7258

HIGH CVSS 8.8 2024-08-23
Threat Entry Updated 2024-09-26

CVE-2024-7778 - Changeset Plugin

The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.10.36 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Changeset

CVE-2024-7778

MEDIUM CVSS 6.4 2024-08-22
Threat Entry Updated 2024-09-27

CVE-2024-7384 - Changeset Plugin

The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the acym_extractArchive function in all versions up to, and including, 9.7.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Changeset

CVE-2024-7384

HIGH CVSS 7.5 2024-08-22
Scroll to top