Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total10
Critical1
High5
Medium4
Reset
Showing 1-10 of 10 records
Threat Entry Updated 2026-03-24

CVE-2026-3533 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and including, 4.14.1. This makes it possible for Authenticated attackers with Subscriber-level access and above, to upload files with dangerous types that can lead to Remote Code Execution on servers configured to handle .phar files as executable PHP (e.g., Apache+mod_php), or Stored Cross-Site Scripting via .svg, .dfxp, or .xhtml files upload on any server…

PLUGIN Jupiter X Core

CVE-2026-3533

HIGH CVSS 8.8 2026-03-24
Threat Entry Updated 2025-06-04

CVE-2025-3888 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File inclusion in all versions up to, and including, 4.8.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the page with the included SVG file.

PLUGIN Jupiter X Core

CVE-2025-3888

MEDIUM CVSS 6.4 2025-05-17
Threat Entry Updated 2025-05-06

CVE-2025-2105 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.8.11 via deserialization of untrusted input from the 'file' parameter of the 'raven_download_file' function. This makes it possible for attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin…

PLUGIN Jupiter X Core

CVE-2025-2105

HIGH CVSS 8.1 2025-04-26
Threat Entry Updated 2025-02-24

CVE-2025-0366 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to Local File Inclusion to Remote Code Execution in all versions up to, and including, 4.8.7 via the get_svg() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution. In this specific case, an attacker can create a form that allows SVG uploads, upload…

PLUGIN Jupiter X Core

CVE-2025-0366

HIGH CVSS 8.8 2025-02-01
Threat Entry Updated 2025-02-24

CVE-2025-0365 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 4.8.7 via the inline SVG feature. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

PLUGIN Jupiter X Core

CVE-2025-0365

MEDIUM CVSS 6.5 2025-02-01
Threat Entry Updated 2025-01-22

CVE-2024-12316 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_popup_action() function in all versions up to, and including, 4.8.5. This makes it possible for unauthenticated attackers to export popup templates.

PLUGIN Jupiter X Core

CVE-2024-12316

MEDIUM CVSS 5.3 2025-01-07
Threat Entry Updated 2025-01-22

CVE-2024-12033 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the sync_libraries() function in all versions up to, and including, 4.8.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to sync libraries

PLUGIN Jupiter X Core

CVE-2024-12033

MEDIUM CVSS 4.3 2025-01-07
Threat Entry Updated 2024-10-02

CVE-2024-7772 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file uploads due to a mishandled file type validation in the 'validate' function in all versions up to, and including, 4.6.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Jupiter X Core

CVE-2024-7772

CRITICAL CVSS 9.8 2024-09-26
Threat Entry Updated 2024-10-02

CVE-2024-7781 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.7.5. This is due to improper authentication via the Social Login widget. This makes it possible for unauthenticated attackers to log in as the first user to have logged in with a social media account, including administrator accounts. Attackers can exploit the vulnerability even if the Social Login element has been disabled, as long as it was previously enabled and used. The vulnerability was partially patched in version 4.7.5, and fully…

PLUGIN Jupiter X Core

CVE-2024-7781

HIGH CVSS 8.1 2024-09-26
Threat Entry Updated 2024-11-21

CVE-2023-3813 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file downloads in versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to download the contents of arbitrary files on the server, which can contain sensitive information. The requires the premium version of the plugin to be activated.

PLUGIN Jupiter X Core

CVE-2023-3813

HIGH CVSS 7.5 2023-07-21
Scroll to top