Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total4
Critical0
High3
Medium1
Reset
Showing 1-4 of 4 records
Threat Entry Updated 2025-11-04

CVE-2025-6990 - Kallyas Theme

The kallyas theme for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.0 via the `TH_PhpCode` pagebuilder widget. This is due to the theme not restricting access to the code editor widget for non-administrators. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.

THEME Kallyas

CVE-2025-6990

HIGH CVSS 8.8 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-6988 - Kallyas Theme

The kallyas theme for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes in all versions up to, and including, 4.23.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

THEME Kallyas

CVE-2025-6988

MEDIUM CVSS 6.4 2025-11-01
Threat Entry Updated 2025-07-29

CVE-2025-6989 - Kallyas Theme

The Kallyas theme for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the delete_font() function in all versions up to, and including, 4.21.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary folders on the server.

THEME Kallyas

CVE-2025-6989

HIGH CVSS 8.1 2025-07-26
Threat Entry Updated 2025-07-29

CVE-2025-6991 - Kallyas Theme

The kallyas theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.21.0 via the 'TH_LatestPosts4` widget. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

THEME Kallyas

CVE-2025-6991

HIGH CVSS 7.5 2025-07-26
Scroll to top