Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total6
Critical2
High1
Medium3
Reset
Showing 1-6 of 6 records
Threat Entry Updated 2026-04-01

CVE-2026-3831 - Elementor Forms Plugin

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the entries_shortcode() function in all versions up to, and including, 1.4.9. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract all form submissions - including names, emails, phone numbers.

PLUGIN Elementor Forms

CVE-2026-3831

MEDIUM CVSS 4.3 2026-04-01
Threat Entry Updated 2026-03-05

CVE-2026-2599 - Elementor Forms Plugin

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input in the 'download_csv' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme…

PLUGIN Elementor Forms

CVE-2026-2599

CRITICAL CVSS 9.8 2026-03-05
Threat Entry Updated 2026-04-15

CVE-2026-0825 - Elementor Forms Plugin

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the CSV export functionality in all versions up to, and including, 1.4.5. This makes it possible for unauthenticated attackers to download sensitive form submission data containing personally identifiable information (PII) by accessing the CSV export endpoint with an export key that is exposed in publicly accessible page source code. The vulnerability is created because while the shortcode properly filters displayed entries by user, the CSV export handler…

PLUGIN Elementor Forms

CVE-2026-0825

MEDIUM CVSS 5.3 2026-01-28
Threat Entry Updated 2025-08-13

CVE-2025-7384 - Elementor Forms Plugin

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.3 via deserialization of untrusted input in the get_lead_detail function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted.

PLUGIN Elementor Forms

CVE-2025-7384

CRITICAL CVSS 9.8 2025-08-13
Threat Entry Updated 2024-11-21

CVE-2024-3715 - Elementor Forms Plugin

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.3.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Elementor Forms

CVE-2024-3715

HIGH CVSS 7.2 2024-05-02
Threat Entry Updated 2024-11-21

CVE-2024-2030 - Elementor Forms Plugin

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Elementor Forms

CVE-2024-2030

MEDIUM CVSS 6.4 2024-03-13
Scroll to top