Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3
Critical1
High1
Medium1
Reset
Showing 1-3 of 3 records
Threat Entry Updated 2026-04-15

CVE-2026-0557 - Wp Data Access Plugin

The WP Data Access plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpda_app' shortcode in all versions up to, and including, 5.5.63 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wp Data Access

CVE-2026-0557

MEDIUM CVSS 6.4 2026-02-14
Threat Entry Updated 2024-11-21

CVE-2023-1874 - Wp Data Access Plugin

The WP Data Access plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.3.7. This is due to a lack of authorization checks on the multiple_roles_update function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wpda_role[]' parameter during a profile update. This requires the 'Enable role management' setting to be enabled for the site.

PLUGIN Wp Data Access

CVE-2023-1874

HIGH CVSS 7.5 2023-04-12
Threat Entry Updated 2024-11-21

CVE-2021-24866 - Wp Data Access Plugin

The WP Data Access WordPress plugin before 5.0.0 does not properly sanitise and escape the backup_date parameter before using it a SQL statement, leading to a SQL injection issue and could allow arbitrary table deletion

PLUGIN Wp Data Access

CVE-2021-24866

CRITICAL CVSS 9.8 2021-12-06
Scroll to top