Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,273
Critical855
High2,814
Medium10,408
Reset
Showing 2221-2240 of 14273 records
Threat Entry Updated 2025-12-18

CVE-2025-13217 - Ultimate Member Plugin

The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the YouTube Video 'value' field in all versions up to, and including, 2.11.0. This is due to insufficient input sanitization and output escaping on user-supplied YouTube video URLs in the `um_profile_field_filter_hook__youtube_video()` function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that execute whenever a user accesses the injected user's profile page.

PLUGIN Ultimate Member

CVE-2025-13217

MEDIUM CVSS 6.4 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-14399 - Download Plugins And Themes In Zip From Dashboard

The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.6. This is due to missing or incorrect nonce validation on the download_plugin_bulk and download_theme_bulk functions. This makes it possible for unauthenticated attackers to archive all the sites plugins and themes and place them in the `wp-content/uploads/` directory via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Download Plugins And Themes In Zip From Dashboard

CVE-2025-14399

MEDIUM CVSS 4.3 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-12496 - Zephyr Project Manager Plugin

The Zephyr Project Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.3.203 via the `file` parameter. This makes it possible for authenticated attackers, with Custom-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. On a servers that have `allow_url_fopen` enabled, this issue allows for Server-Side Request Forgery

PLUGIN Zephyr Project Manager

CVE-2025-12496

MEDIUM CVSS 4.9 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-14061 - Gdpr Cookie Consent Plugin

The Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the gdpr_delete_policy_data function in all versions up to, and including, 4.0.7. This makes it possible for unauthenticated attackers to permanently delete arbitrary posts, pages, attachments, and other post types by ID.

PLUGIN Gdpr Cookie Consent

CVE-2025-14061

MEDIUM CVSS 5.3 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-13750 - Avif Plugin

The Converter for Media – Optimize images | Convert WebP & AVIF plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `/webp-converter/v1/regenerate-attachment` REST endpoint in all versions up to, and including, 6.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete optimized WebP/AVIF variants for arbitrary attachments.

PLUGIN Avif

CVE-2025-13750

MEDIUM CVSS 4.3 2025-12-17
Threat Entry Updated 2026-01-05

CVE-2025-11924 - Contact Form Builder That Grows With You Plugin

The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.13.2. This is due to the plugin not properly verifying that a user is authorized before the `ninja-forms-views` REST endpoints return form metadata and submission content. This makes it possible for unauthenticated attackers to read arbitrary form definitions and submission records via a leaked bearer token granted they can load any page containing the Submissions Table block. NOTE: The developer released a…

PLUGIN Contact Form Builder That Grows With You

CVE-2025-11924

HIGH CVSS 7.5 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-14154 - Buddyboss Plugin

The Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss plugin for WordPress is vulnerable to Stored Cross-Site Scripting via guest display name in all versions up to, and including, 2.10.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Buddyboss

CVE-2025-14154

MEDIUM CVSS 6.1 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-13880 - Wp Social Reviews Plugin

The WP Social Ninja – Embed Social Feeds, Customer Reviews, Chat Widgets (Google Reviews, YouTube Feed, Photo Feeds, and More) plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the getAdvanceSettings and saveAdvanceSettings functions in all versions up to, and including, 4.0.1. This makes it possible for unauthenticated attackers to view and modify plugin's advanced settings.

PLUGIN Wp Social Reviews

CVE-2025-13880

MEDIUM CVSS 6.5 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-14385 - Wp Recipe Maker Plugin

The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'name' parameter in all versions up to, and including, 10.2.3 due to insufficient input sanitization and output escaping on user-supplied attributes in the wprm-recipe-roundup-item shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wp Recipe Maker

CVE-2025-14385

MEDIUM CVSS 6.4 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-13861 - Html Forms Plugin

The HTML Forms – Simple WordPress Forms Plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in all versions up to and including 1.6.0 due to insufficient sanitization of fabricated file upload field metadata before displaying it in the WordPress admin dashboard. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute whenever an administrator accesses the form submissions page.

PLUGIN Html Forms

CVE-2025-13861

MEDIUM CVSS 6.1 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-13977 - Essential Addons For Elementor Lite Plugin

The Essential Addons for Elementor – Popular Elementor Templates & Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple attack vectors in all versions up to, and including, 6.5.3. This is due to insufficient input sanitization and output escaping in the Event Calendar widget's custom attributes handling and the Image Masking module's element ID rendering. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Essential Addons For Elementor Lite

CVE-2025-13977

MEDIUM CVSS 6.4 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-11369 - Essential Blocks Plugin

The Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns plugin for WordPress is vulnerable to unauthorized access of data due to a missing or incorrect capability checks on the get_instagram_access_token_callback, google_map_api_key_save_callback and get_siteinfo functions in all versions up to, and including, 5.7.2. This makes it possible for authenticated attackers, with Author-level access and above, to view API keys configured for the external services.

PLUGIN Essential Blocks

CVE-2025-11369

MEDIUM CVSS 4.3 2025-12-17
Threat Entry Updated 2025-12-16

CVE-2025-13741 - Post Expirator Plugin

The Schedule Post Changes With PublishPress Future: Unpublish, Delete, Change Status, Trash, Change Categories plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the getAuthors function in all versions up to, and including, 4.9.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to retrieve emails for all users with edit_posts capability.

PLUGIN Post Expirator

CVE-2025-13741

MEDIUM CVSS 4.3 2025-12-16
Threat Entry Updated 2025-12-16

CVE-2025-11220 - Elementor Plugin

The Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Text Path widget in all versions up to, and including, 3.33.3 due to insufficient neutralization of user-supplied input used to build SVG markup inside the widget. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Elementor

CVE-2025-11220

MEDIUM CVSS 6.4 2025-12-16
Threat Entry Updated 2025-12-16

CVE-2025-14002 - Wpcom Member Plugin

The WPCOM Member plugin for WordPress is vulnerable to authentication bypass via brute force in all versions up to, and including, 1.7.16. This is due to weak OTP (One-Time Password) generation using only 6 numeric digits combined with a 10-minute validity window and no rate limiting on verification attempts. This makes it possible for unauthenticated attackers to brute-force the verification code and authenticate as any user, including administrators, if they know the target's phone number, and the target does not notice or ignores the SMS notification with the OTP.

PLUGIN Wpcom Member

CVE-2025-14002

HIGH CVSS 8.1 2025-12-16
Threat Entry Updated 2025-12-16

CVE-2025-13231 - Fancy Product Designer Plugin

The Fancy Product Designer plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.4.8. This is due to a time-of-check/time-of-use (TOCTOU) race condition in the 'url' parameter of the fpd_custom_uplod_file AJAX action. The plugin validates the URL by calling getimagesize() first, then later retrieves the same URL using file_get_contents(). This makes it possible for unauthenticated attackers to exploit the timing gap to perform SSRF attacks by serving a valid image during validation, then changing the response to redirect to arbitrary internal or external…

PLUGIN Fancy Product Designer

CVE-2025-13231

MEDIUM CVSS 6.5 2025-12-16
Threat Entry Updated 2026-01-22

CVE-2025-13439 - Fancy Product Designer Plugin

The Fancy Product Designer plugin for WordPress is vulnerable to Information Disclosure and PHAR Deserialization in all versions up to, and including, 6.4.8. This is due to insufficient validation of user-supplied input in the 'url' parameter of the 'fpd_custom_uplod_file' AJAX action, which flows directly into the 'getimagesize' function without sanitization. This makes it possible for unauthenticated attackers to read arbitrary sensitive files from the server, including wp-config.php.

PLUGIN Fancy Product Designer

CVE-2025-13439

MEDIUM CVSS 5.9 2025-12-16
Threat Entry Updated 2025-12-16

CVE-2025-11991 - Dynamic Blocks Form Builder Plugin

The JetFormBuilder — Dynamic Blocks Form Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the run_callback function in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to generate forms using AI, consuming site's AI usage limits.

PLUGIN Dynamic Blocks Form Builder

CVE-2025-11991

MEDIUM CVSS 5.3 2025-12-16
Threat Entry Updated 2025-12-16

CVE-2025-13794 - Auto Post Thumbnail Plugin

The Auto Featured Image (Auto Post Thumbnail) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the bulk_action_generate_handler function in all versions up to, and including, 4.2.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete or generate featured images on posts they do not own.

PLUGIN Auto Post Thumbnail

CVE-2025-13794

MEDIUM CVSS 4.3 2025-12-16
Threat Entry Updated 2025-12-16

CVE-2025-12809 - Dokan Pro Plugin

The Dokan Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `/dokan/v1/wholesale/register` REST API endpoint in all versions up to, and including, 4.1.3. This makes it possible for unauthenticated attackers to enumerate users and retrieve their email addresses via the REST API by providing a user ID, along with other information such as usernames, display names, user roles, and registration dates.

PLUGIN Dokan Pro

CVE-2025-12809

MEDIUM CVSS 5.3 2025-12-16
Scroll to top