Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,135
Critical849
High2,791
Medium10,301
Reset
Showing 201-220 of 14135 records
Threat Entry Updated 2026-03-24

CVE-2026-3138 - Product Filter For Woocommerce By Wbw Plugin

The Product Filter for WooCommerce by WBW plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check in all versions up to, and including, 3.1.2. This is due to the plugin's MVC framework dynamically registering unauthenticated AJAX handlers via `wp_ajax_nopriv_` hooks without verifying user capabilities, combined with the base controller's `__call()` magic method forwarding undefined method calls to the model layer, and the `havePermissions()` method defaulting to `true` when no permissions are explicitly defined. This makes it possible for unauthenticated attackers to truncate the plugin's…

PLUGIN Product Filter For Woocommerce By Wbw

CVE-2026-3138

MEDIUM CVSS 6.5 2026-03-24
Threat Entry Updated 2026-03-24

CVE-2026-3079 - Learndash Lms Plugin

The LearnDash LMS plugin for WordPress is vulnerable to blind time-based SQL Injection via the 'filters[orderby_order]' parameter in the 'learndash_propanel_template' AJAX action in all versions up to, and including, 5.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Learndash Lms

CVE-2026-3079

MEDIUM CVSS 6.5 2026-03-24
Threat Entry Updated 2026-03-24

CVE-2026-33290 - Wp Graphql Plugin

WPGraphQL provides a GraphQL API for WordPress sites. Prior to version 2.10.0, an authorization flaw in updateComment allows an authenticated low-privileged user (including a custom role with zero capabilities) to change moderation status of their own comment (for example to APPROVE) without the moderate_comments capability. This can bypass moderation workflows and let untrusted users self-approve content. Version 2.10.0 contains a patch. ### Details In WPGraphQL 2.9.1 (tested), authorization for updateComment is owner-based, not field-based: - plugins/wp-graphql/src/Mutation/CommentUpdate.php:92 allows moderators. - plugins/wp-graphql/src/Mutation/CommentUpdate.php:99:99 also allows the comment owner, even if they lack moderation…

PLUGIN Wp Graphql

CVE-2026-33290

MEDIUM CVSS 4.3 2026-03-24
Threat Entry Updated 2026-03-24

CVE-2026-4001 - Woocommerce Custom Product Addons Pro Plugin

The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.4.1 via the custom pricing formula eval() in the process_custom_formula() function within includes/process/price.php. This is due to insufficient sanitization and validation of user-submitted field values before passing them to PHP's eval() function. The sanitize_values() method strips HTML tags but does not escape single quotes or prevent PHP code injection. This makes it possible for unauthenticated attackers to execute arbitrary code on the server by submitting a crafted value…

PLUGIN Woocommerce Custom Product Addons Pro

CVE-2026-4001

CRITICAL CVSS 9.8 2026-03-24
Threat Entry Updated 2026-03-24

CVE-2026-4021 - Contest Gallery Plugin

The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28.1.5. This is due to the email confirmation handler in `users-registry-check-after-email-or-pin-confirmation.php` using the user's email string in a `WHERE ID = %s` clause instead of the numeric user ID, combined with an unauthenticated key-based login endpoint in `ajax-functions-frontend.php`. When the non-default `RegMailOptional=1` setting is enabled, an attacker can register with a crafted email starting with the target user ID (e.g., `1poc@example.test`), trigger the confirmation flow to…

PLUGIN Contest Gallery

CVE-2026-4021

HIGH CVSS 8.1 2026-03-24
Threat Entry Updated 2026-03-24

CVE-2026-4056 - User Registration Plugin

The User Registration & Membership plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the Content Access Rules REST API endpoints in versions 5.0.1 through 5.1.4. This is due to the `check_permissions()` method only checking for `edit_posts` capability instead of an administrator-level capability. This makes it possible for authenticated attackers, with Contributor-level access and above, to list, create, modify, toggle, duplicate, and delete site-wide content restriction rules, potentially exposing restricted content or denying legitimate user access.

PLUGIN User Registration

CVE-2026-4056

MEDIUM CVSS 5.4 2026-03-24
Threat Entry Updated 2026-03-24

CVE-2026-3533 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and including, 4.14.1. This makes it possible for Authenticated attackers with Subscriber-level access and above, to upload files with dangerous types that can lead to Remote Code Execution on servers configured to handle .phar files as executable PHP (e.g., Apache+mod_php), or Stored Cross-Site Scripting via .svg, .dfxp, or .xhtml files upload on any server…

PLUGIN Jupiter X Core

CVE-2026-3533

HIGH CVSS 8.8 2026-03-24
Threat Entry Updated 2026-03-24

CVE-2026-4306 - Wp Job Portal Plugin

The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter in all versions up to, and including, 2.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Wp Job Portal

CVE-2026-4306

HIGH CVSS 7.5 2026-03-23
Threat Entry Updated 2026-03-24

CVE-2026-4066 - Smart Custom Fields Plugin

The Smart Custom Fields plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the relational_posts_search() function in all versions up to, and including, 5.0.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to read private and draft post content from other authors via the smart-cf-relational-posts-search AJAX action. The function queries posts with post_status=any and returns full WP_Post objects including post_content, but only checks the generic edit_posts capability instead of verifying whether the requesting user has permission to read…

PLUGIN Smart Custom Fields

CVE-2026-4066

MEDIUM CVSS 4.3 2026-03-23
Threat Entry Updated 2026-03-24

CVE-2026-3225 - LearnPress – WordPress LMS Plugin for Create and Sell Online Courses

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized deletion of quiz question answers due to a missing capability check in the delete_question_answer() function of the EditQuestionAjax class in all versions up to, and including, 4.3.2.8. The AbstractAjax::catch_lp_ajax() dispatcher verifies a wp_rest nonce but performs no current_user_can() check, and the QuestionAnswerModel::delete() method only validates minimum answer counts without checking user capabilities. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete answer options from any quiz question on the site.

PLUGIN LearnPress – WordPress LMS Plugin for Create and Sell Online Courses

CVE-2026-3225

MEDIUM CVSS 4.3 2026-03-23
Threat Entry Updated 2026-03-24

CVE-2026-2412 - Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker Plugin

The Quiz and Survey Master (QSM) plugin for WordPress is vulnerable to SQL Injection via the 'merged_question' parameter in all versions up to, and including, 10.3.5. This is due to insufficient sanitization of user-supplied input before being used in a SQL query. The sanitize_text_field() function applied to the merged_question parameter does not prevent SQL metacharacters like ), OR, AND, and # from being included in the value, which is then directly concatenated into a SQL IN() clause without using $wpdb->prepare() or casting values to integers. This makes it possible for…

PLUGIN Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker

CVE-2026-2412

MEDIUM CVSS 6.5 2026-03-23
Threat Entry Updated 2026-04-15

CVE-2026-1969 - Before 2 Plugin

The trx_addons WordPress plugin before 2.38.5 does not correctly validate file types in one of its AJAX action, allowing unauthenticated users to upload arbitrary file. This is due to an incorrect fix of CVE-2024-13448

PLUGIN Before 2

CVE-2026-1969

MEDIUM CVSS 5.3 2026-03-23
Threat Entry Updated 2026-03-23

CVE-2026-2580 - Wp Google Map Plugin

The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 4.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Wp Google Map

CVE-2026-2580

HIGH CVSS 7.5 2026-03-23
Threat Entry Updated 2026-03-23

CVE-2026-4314 - The Ultimate WordPress Toolkit – WP Extended Plugin

The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the `isDashboardOrProfileRequest()` method in the Menu Editor module using an insecure `strpos()` check against `$_SERVER['REQUEST_URI']` to determine if a request targets the dashboard or profile page. The `grantVirtualCaps()` method, which is hooked into the `user_has_cap` filter, grants elevated capabilities including `manage_options` when this check returns true. This makes it possible for authenticated attackers, with Subscriber-level access and above, to gain administrative capabilities…

PLUGIN The Ultimate WordPress Toolkit – WP Extended

CVE-2026-4314

HIGH CVSS 8.8 2026-03-22
Threat Entry Updated 2026-03-23

CVE-2026-3427 - Advanced Seo With Real Time Guidance And Built In Ai Plugin

The Yoast SEO – Advanced SEO with real-time guidance and built-in AI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the the `jsonText` block attribute in all versions up to, and including, 27.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Advanced Seo With Real Time Guidance And Built In Ai

CVE-2026-3427

MEDIUM CVSS 6.4 2026-03-22
Threat Entry Updated 2026-03-23

CVE-2026-3629 - Import And Export Users And Customers Plugin

The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.29.7. This is due to the 'save_extra_user_profile_fields' function not properly restricting which user meta keys can be updated via profile fields. The 'get_restricted_fields' method does not include sensitive meta keys such as 'wp_capabilities'. This makes it possible for unauthenticated attackers to escalate their privileges to Administrator by submitting a crafted registration request that sets the 'wp_capabilities' meta key. The vulnerability can only be exploited if the "Show fields…

PLUGIN Import And Export Users And Customers

CVE-2026-3629

HIGH CVSS 8.1 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-4373 - JetFormBuilder — Dynamic Blocks Form Builder Plugin

The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 3.5.6.2. This is due to the 'Uploaded_File::set_from_array' method accepting user-supplied file paths from the Media Field preset JSON payload without validating that the path belongs to the WordPress uploads directory. Combined with an insufficient same-file check in 'File_Tools::is_same_file' that only compares basenames, this makes it possible for unauthenticated attackers to exfiltrate arbitrary local files as email attachments by submitting a crafted form request when the form is configured with…

PLUGIN JetFormBuilder — Dynamic Blocks Form Builder

CVE-2026-4373

HIGH CVSS 7.5 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-4261 - Expire Users Plugin

The Expire Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.2. This is due to the plugin allowing a user to update the 'on_expire_default_to_role' meta through the 'save_extra_user_profile_fields' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator.

PLUGIN Expire Users

CVE-2026-4261

HIGH CVSS 8.8 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-4161 - Review Map By Revukangaroo Plugin

The Review Map by RevuKangaroo plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin settings in all versions up to, and including, 1.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Review Map By Revukangaroo

CVE-2026-4161

MEDIUM CVSS 4.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-4143 - Neos Connector For Fakturama Plugin

The Neos Connector for Fakturama plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to and including 0.0.14. This is due to missing nonce validation in the ncff_add_plugin_page() function which handles settings updates. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request, granted they can trick a site administrator into performing an action such as clicking a link.

PLUGIN Neos Connector For Fakturama

CVE-2026-4143

MEDIUM CVSS 4.3 2026-03-21
Scroll to top