Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total6
Critical1
High0
Medium5
Reset
Showing 1-6 of 6 records
Threat Entry Updated 2026-01-27

CVE-2025-8113 - Ebook Store Plugin

The Ebook Store WordPress plugin before 5.8015 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers.

PLUGIN Ebook Store

CVE-2025-8113

MEDIUM CVSS 6.1 2025-08-16
Threat Entry Updated 2025-07-25

CVE-2025-7437 - Ebook Store Plugin

The Ebook Store plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ebook_store_save_form function in all versions up to, and including, 5.8012. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Ebook Store

CVE-2025-7437

CRITICAL CVSS 9.8 2025-07-24
Threat Entry Updated 2025-07-22

CVE-2025-7486 - Ebook Store Plugin

The Ebook Store plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Order Details in all versions up to, and including, 5.8012 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Ebook Store

CVE-2025-7486

MEDIUM CVSS 4.4 2025-07-21
Threat Entry Updated 2025-02-28

CVE-2024-12262 - Ebook Store Plugin

The Ebook Store plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'step' parameter in all versions up to, and including, 5.8001 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Ebook Store

CVE-2024-12262

MEDIUM CVSS 6.1 2024-12-21
Threat Entry Updated 2025-02-28

CVE-2024-11287 - Ebook Store Plugin

The Ebook Store plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 5.8001. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Ebook Store

CVE-2024-11287

MEDIUM CVSS 6.1 2024-12-21
Threat Entry Updated 2025-03-01

CVE-2024-6567 - Ebook Store Plugin

The Ebook Store plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 5.8001. This is due to the plugin utilizing fpdi-protection and not preventing direct access to test files that have display_errors set to true. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.

PLUGIN Ebook Store

CVE-2024-6567

MEDIUM CVSS 5.3 2024-08-02
Scroll to top