Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total11
Critical6
High3
Medium2
Reset
Showing 1-11 of 11 records
Threat Entry Updated 2026-03-04

CVE-2026-1980 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to unauthorized data disclosure due to a missing authorization check on the 'get_customer_list' route in all versions up to, and including, 1.0.8. This makes it possible for unauthenticated attackers to retrieve sensitive customer information including names, emails, phone numbers, dates of birth, and gender.

PLUGIN Wpbookit

CVE-2026-1980

MEDIUM CVSS 5.3 2026-03-04
Threat Entry Updated 2026-03-04

CVE-2026-1945 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpb_user_name' and 'wpb_user_email' parameters in all versions up to, and including, 1.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wpbookit

CVE-2026-1945

HIGH CVSS 7.2 2026-03-04
Threat Entry Updated 2026-01-02

CVE-2025-12685 - Wpbookit Plugin

The WPBookit WordPress plugin through 1.0.7 lacks a CSRF check when deleting customers. This could allow an unauthenticated attacker to delete any customer through a CSRF attack.

PLUGIN Wpbookit

CVE-2025-12685

MEDIUM CVSS 6.5 2026-01-02
Threat Entry Updated 2025-11-21

CVE-2025-12135 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'css_code' parameter in all versions up to, and including, 1.0.6 due to a missing capability check on the save_custome_code() function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wpbookit

CVE-2025-12135

HIGH CVSS 7.2 2025-11-21
Threat Entry Updated 2025-07-25

CVE-2025-7852 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_new_customer' route in all versions up to, and including, 1.0.6. The plugin’s image‐upload handler calls move_uploaded_file() on client‐supplied files without restricting allowed extensions or MIME types, nor sanitizing the filename. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Wpbookit

CVE-2025-7852

CRITICAL CVSS 9.8 2025-07-24
Threat Entry Updated 2025-07-16

CVE-2025-6058 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the image_upload_handle() function hooked via the 'add_booking_type' route in all versions up to, and including, 1.0.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Wpbookit

CVE-2025-6058

CRITICAL CVSS 9.8 2025-07-12
Threat Entry Updated 2025-07-16

CVE-2025-6057 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_image_upload() function in all versions up to, and including, 1.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Wpbookit

CVE-2025-6057

HIGH CVSS 8.8 2025-07-12
Threat Entry Updated 2025-06-27

CVE-2025-3811 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like email through the edit_newdata_customer_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

PLUGIN Wpbookit

CVE-2025-3811

CRITICAL CVSS 9.8 2025-05-09
Threat Entry Updated 2025-06-27

CVE-2025-3810 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like password and email through the edit_profile_data() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses and passwords, including administrators, and leverage that to gain access to their account.

PLUGIN Wpbookit

CVE-2025-3810

CRITICAL CVSS 9.8 2025-05-09
Threat Entry Updated 2025-06-27

CVE-2025-0357 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Wpbookit

CVE-2025-0357

CRITICAL CVSS 9.8 2025-01-25
Threat Entry Updated 2025-06-27

CVE-2024-10215 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to Arbitrary User Password Change in versions up to, and including, 1.6.4. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts.

PLUGIN Wpbookit

CVE-2024-10215

CRITICAL CVSS 9.8 2025-01-09
Scroll to top