Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total9
Critical0
High2
Medium7
Reset
Showing 1-9 of 9 records
Threat Entry Updated 2025-10-09

CVE-2025-10249 - Slider Revolution Plugin

The Slider Revolution plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on several functions in all versions up to, and including, 6.7.37. This makes it possible for authenticated attackers, with Contributor-level access and above, to install and activate plugin add-ons, create sliders, and download arbitrary files.

PLUGIN Slider Revolution

CVE-2025-10249

MEDIUM CVSS 6.5 2025-10-09
Threat Entry Updated 2025-08-29

CVE-2025-9217 - Slider Revolution Plugin

The Slider Revolution plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.7.36 via the 'used_svg' and 'used_images' parameters. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

PLUGIN Slider Revolution

CVE-2025-9217

MEDIUM CVSS 6.5 2025-08-29
Threat Entry Updated 2024-11-13

CVE-2024-8107 - Slider Revolution Plugin

The Slider Revolution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.7.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. By default, this can only be exploited by administrators, but the ability to use and configure Slider Revolution can be extended to authors.

PLUGIN Slider Revolution

CVE-2024-8107

MEDIUM CVSS 6.4 2024-10-01
Threat Entry Updated 2025-01-27

CVE-2024-4637 - Slider Revolution Plugin

The Slider Revolution plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 6.7.10 due to insufficient input sanitization and output escaping on the user supplied Elementor 'wrapperid' and 'zindex' display attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Slider Revolution

CVE-2024-4637

MEDIUM CVSS 6.4 2024-06-04
Threat Entry Updated 2025-01-27

CVE-2024-4581 - Slider Revolution Plugin

The Slider Revolution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Add Layer widget in all versions up to, and including, 6.7.11 due to insufficient input sanitization and output escaping on the user supplied 'class', 'id', and 'title' attributes. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: Successful exploitation of this vulnerability requires an Administrator to give Slider Creation privileges to Author-level users.

PLUGIN Slider Revolution

CVE-2024-4581

MEDIUM CVSS 6.4 2024-06-04
Threat Entry Updated 2025-02-03

CVE-2024-4092 - Slider Revolution Plugin

The Slider Revolution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘htmltag’ parameter in all versions up to, and including, 6.7.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, this can only be exploited by administrators, but the ability to use and configure Slider Revolution can be extended to authors.

PLUGIN Slider Revolution

CVE-2024-4092

MEDIUM CVSS 6.4 2024-05-02
Threat Entry Updated 2024-11-21

CVE-2024-2306 - Slider Revolution Plugin

The Revslider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via svg upload in all versions up to, and including, 6.6.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. By default, this can only be exploited by administrators, but the ability to use and configure revslider can be extended to authors.

PLUGIN Slider Revolution

CVE-2024-2306

MEDIUM CVSS 6.4 2024-04-09
Threat Entry Updated 2025-06-03

CVE-2023-6528 - Slider Revolution Plugin

The Slider Revolution WordPress plugin before 6.6.19 does not prevent users with at least the Author role from unserializing arbitrary content when importing sliders, potentially leading to Remote Code Execution.

PLUGIN Slider Revolution

CVE-2023-6528

HIGH CVSS 8.8 2024-01-08
Threat Entry Updated 2024-12-12

CVE-2023-2359 - Slider Revolution Plugin

The Slider Revolution WordPress plugin through 6.6.12 does not check for valid image files upon import, leading to an arbitrary file upload which may be escalated to Remote Code Execution in some server configurations.

PLUGIN Slider Revolution

CVE-2023-2359

HIGH CVSS 8.8 2023-06-19
Scroll to top