Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total4
Critical0
High3
Medium1
Reset
Showing 1-4 of 4 records
Threat Entry Updated 2025-12-08

CVE-2025-13065 - Starter Templates Plugin

The Starter Templates plugin for WordPress is vulnerable to arbitrary file upload in all versions up to, and including, 4.4.41. This is due to insufficient file type validation detecting WXR files, allowing double extension files to bypass sanitization while being accepted as a valid WXR file. This makes it possible for authenticated attackers, with author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Starter Templates

CVE-2025-13065

HIGH CVSS 8.8 2025-12-06
Threat Entry Updated 2025-03-12

CVE-2024-13924 - Starter Templates Plugin

The Starter Templates by FancyWP plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 2.0.0 via the 'http_request_host_is_external' filter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Starter Templates

CVE-2024-13924

MEDIUM CVSS 5.3 2025-03-08
Threat Entry Updated 2024-11-21

CVE-2023-41804 - Starter Templates Plugin

Server-Side Request Forgery (SSRF) vulnerability in Brainstorm Force Starter Templates — Elementor, WordPress & Beaver Builder Templates.This issue affects Starter Templates — Elementor, WordPress & Beaver Builder Templates: from n/a through 3.2.4.

PLUGIN Starter Templates

CVE-2023-41804

HIGH CVSS 7.1 2023-12-07
Threat Entry Updated 2024-11-21

CVE-2021-42360 - Starter Templates Plugin

On sites that also had the Elementor plugin for WordPress installed, it was possible for users with the edit_posts capability, which includes Contributor-level users, to import blocks onto any page using the astra-page-elementor-batch-process AJAX action. An attacker could craft and host a block containing malicious JavaScript on a server they controlled, and then use it to overwrite any post or page by sending an AJAX request with the action set to astra-page-elementor-batch-process and the url parameter pointed to their remotely-hosted malicious block, as well as an id parameter containing the…

PLUGIN Starter Templates

CVE-2021-42360

HIGH CVSS 7.6 2021-11-17
Scroll to top