Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total7
Critical1
High4
Medium2
Reset
Showing 1-7 of 7 records
Threat Entry Updated 2026-03-24

CVE-2026-3533 - Jupiterx Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and including, 4.14.1. This makes it possible for Authenticated attackers with Subscriber-level access and above, to upload files with dangerous types that can lead to Remote Code Execution on servers configured to handle .phar files as executable PHP (e.g., Apache+mod_php), or Stored Cross-Site Scripting via .svg, .dfxp, or .xhtml files upload on any server…

PLUGIN Jupiterx Core

CVE-2026-3533

HIGH CVSS 8.8 2026-03-24
Threat Entry Updated 2025-06-04

CVE-2025-3888 - Jupiterx Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File inclusion in all versions up to, and including, 4.8.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the page with the included SVG file.

PLUGIN Jupiterx Core

CVE-2025-3888

MEDIUM CVSS 6.4 2025-05-17
Threat Entry Updated 2025-05-06

CVE-2025-2105 - Jupiterx Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.8.11 via deserialization of untrusted input from the 'file' parameter of the 'raven_download_file' function. This makes it possible for attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin…

PLUGIN Jupiterx Core

CVE-2025-2105

HIGH CVSS 8.1 2025-04-26
Threat Entry Updated 2025-01-22

CVE-2024-12316 - Jupiterx Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the export_popup_action() function in all versions up to, and including, 4.8.5. This makes it possible for unauthenticated attackers to export popup templates.

PLUGIN Jupiterx Core

CVE-2024-12316

MEDIUM CVSS 5.3 2025-01-07
Threat Entry Updated 2024-10-02

CVE-2024-7772 - Jupiterx Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file uploads due to a mishandled file type validation in the 'validate' function in all versions up to, and including, 4.6.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Jupiterx Core

CVE-2024-7772

CRITICAL CVSS 9.8 2024-09-26
Threat Entry Updated 2024-10-02

CVE-2024-7781 - Jupiterx Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.7.5. This is due to improper authentication via the Social Login widget. This makes it possible for unauthenticated attackers to log in as the first user to have logged in with a social media account, including administrator accounts. Attackers can exploit the vulnerability even if the Social Login element has been disabled, as long as it was previously enabled and used. The vulnerability was partially patched in version 4.7.5, and fully…

PLUGIN Jupiterx Core

CVE-2024-7781

HIGH CVSS 8.1 2024-09-26
Threat Entry Updated 2024-11-21

CVE-2023-3813 - Jupiterx Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file downloads in versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to download the contents of arbitrary files on the server, which can contain sensitive information. The requires the premium version of the plugin to be activated.

PLUGIN Jupiterx Core

CVE-2023-3813

HIGH CVSS 7.5 2023-07-21
Scroll to top