Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total6
Critical2
High0
Medium4
Reset
Showing 1-6 of 6 records
Threat Entry Updated 2025-05-23

CVE-2025-0493 - Ultimate Woocommerce Multivendor Marketplace Solution Plugin

The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Limited Local File Inclusion in all versions up to, and including, 4.2.14 via the tabname parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included

PLUGIN Ultimate Woocommerce Multivendor Marketplace Solution

CVE-2025-0493

CRITICAL CVSS 9.8 2025-01-31
Threat Entry Updated 2025-01-18

CVE-2024-13519 - Ultimate Woocommerce Multivendor Marketplace Solution Plugin

The MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin's settings in all versions up to, and including, 1.9.80 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Shop Manager-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Ultimate Woocommerce Multivendor Marketplace Solution

CVE-2024-13519

MEDIUM CVSS 4.4 2025-01-18
Threat Entry Updated 2024-12-25

CVE-2024-12413 - Ultimate Woocommerce Multivendor Marketplace Solution Plugin

The MarketKing — Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on several functions like 'marketking_delete_team_member', 'marketkingrejectuser', 'marketking_save_profile_settings', and many more in all versions up to, and including, 2.0.00. This makes it possible for unauthenticated attackers to delete users, update settings, approve users, and more.

PLUGIN Ultimate Woocommerce Multivendor Marketplace Solution

CVE-2024-12413

MEDIUM CVSS 5.3 2024-12-25
Threat Entry Updated 2025-06-05

CVE-2024-9943 - Ultimate Woocommerce Multivendor Marketplace Solution Plugin

The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.4. This is due to missing or incorrect nonce validation on several functions in api/class-mvx-rest-controller.php. This makes it possible for unauthenticated attackers to update vendor account details, create vendor accounts, and delete arbitrary users via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Ultimate Woocommerce Multivendor Marketplace Solution

CVE-2024-9943

MEDIUM CVSS 6.3 2024-10-24
Threat Entry Updated 2025-06-05

CVE-2024-9531 - Ultimate Woocommerce Multivendor Marketplace Solution Plugin

The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'mvx_sent_deactivation_request' function in all versions up to, and including, 4.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to send a canned email to the site's administrator asking to delete the profile of an arbitrary vendor.

PLUGIN Ultimate Woocommerce Multivendor Marketplace Solution

CVE-2024-9531

MEDIUM CVSS 4.3 2024-10-24
Threat Entry Updated 2024-09-05

CVE-2024-8289 - Ultimate Woocommerce Multivendor Marketplace Solution Plugin

The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to privilege escalation/de-escalation and account takeover due to an insufficient capability check on the update_item_permissions_check and create_item_permissions_check functions in all versions up to, and including, 4.2.0. This makes it possible for unauthenticated attackers to change the password of any user with the vendor role, create new users with the vendor role, and demote other users like administrators to the vendor role.

PLUGIN Ultimate Woocommerce Multivendor Marketplace Solution

CVE-2024-8289

CRITICAL CVSS 9.8 2024-09-04
Scroll to top