Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,273
Critical855
High2,814
Medium10,408
Reset
Showing 2321-2340 of 14273 records
Threat Entry Updated 2025-12-12

CVE-2025-13993 - Official Mailerlite Sign Up Forms Plugin

The MailerLite – Signup forms (official) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'form_description' and 'success_message' parameters in versions up to, and including, 1.7.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Official Mailerlite Sign Up Forms

CVE-2025-13993

MEDIUM CVSS 5.5 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-14074 - Pdf For Contact Form 7 Plugin

The PDF for Contact Form 7 + Drag and Drop Template Builder plugin for WordPress is vulnerable to unauthorized post duplication due to a missing capability check on the 'rednumber_duplicate' function in all versions up to, and including, 6.3.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to duplicate arbitrary posts, including password protected or private ones.

PLUGIN Pdf For Contact Form 7

CVE-2025-14074

MEDIUM CVSS 5.3 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-12348 - Newsletters And Marketing Automation Plugin

The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `run_action_scheduler_task` function. This makes it possible for unauthenticated attackers to execute scheduled actions early or repeatedly by guessing action IDs, potentially triggering email sends, maintenance tasks, or other privileged operations, causing unexpected state changes and resource usage.

PLUGIN Newsletters And Marketing Automation

CVE-2025-12348

MEDIUM CVSS 5.3 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-12960 - Simple Csv Table Plugin

The Simple CSV Table plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.0.1 via the `href` parameter in the `[csv]` shortcode. This is due to insufficient path validation before concatenating user-supplied input to a base directory path. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information such as database credentials and authentication keys.

PLUGIN Simple Csv Table

CVE-2025-12960

MEDIUM CVSS 6.5 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-4970 - Bsk Pdf Manager Plugin

The BSK PDF Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Bsk Pdf Manager

CVE-2025-4970

MEDIUM CVSS 5.5 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-14169 - Funnel Builder Plugin

The FunnelKit - Funnel Builder for WooCommerce Checkout plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'opid' parameter in all versions up to, and including, 3.13.1.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Funnel Builder

CVE-2025-14169

HIGH CVSS 7.5 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-13891 - Modula Best Grid Gallery Plugin

The Image Gallery – Photo Grid & Video Gallery plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.13.3. This is due to the modula_list_folders AJAX endpoint that lacks proper path validation and base directory restrictions. While the endpoint verifies user capabilities (Author+ with upload_files and edit_posts permissions), it fails to validate that user-supplied directory paths reside within safe directories. This makes it possible for authenticated attackers, with Author-level access and above, to enumerate arbitrary directories on the server via the modula_list_folders endpoint.

PLUGIN Modula Best Grid Gallery

CVE-2025-13891

MEDIUM CVSS 6.5 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-11876 - Mailgun Subscriptions Plugin

The Mailgun Subscriptions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mailgun_subscription_form' shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Mailgun Subscriptions

CVE-2025-11876

MEDIUM CVSS 6.4 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-14049 - Vikrentitems Plugin

The VikRentItems Flexible Rental Management System plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'delto' parameter in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Vikrentitems

CVE-2025-14049

MEDIUM CVSS 6.1 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-10583 - Wp Fastest Cache Plugin

The WP Fastest Cache plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.7.4 via the 'get_server_time_ajax_request' AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Wp Fastest Cache

CVE-2025-10583

LOW CVSS 3.5 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-14068 - Wpnakama Plugin

The WPNakama plugin for WordPress is vulnerable to time-based SQL Injection via the 'order_by' parameter in all versions up to, and including, 0.6.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Wpnakama

CVE-2025-14068

HIGH CVSS 7.5 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-13660 - Guest Support Plugin

The Guest Support plugin for WordPress is vulnerable to User Email Disclosure in versions up to, and including, 1.2.3. This is due to the plugin exposing a public AJAX endpoint that allows anyone to search for and retrieve user email addresses without any authentication or capability checks. This makes it possible for unauthenticated attackers to enumerate user accounts and extract email addresses via the guest_support_handler=ajax endpoint with the request=get_users parameter.

PLUGIN Guest Support

CVE-2025-13660

MEDIUM CVSS 5.3 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-12655 - Hippoo Mobile App For Woocommerce Plugin

The Hippoo Mobile App for WooCommerce plugin for WordPress is vulnerable to arbitrary file write via a missing authorization check in all versions up to, and including, 1.7.1. This is due to the REST API endpoint `/wp-json/hippoo/v1/wc/token/save_callback/{token_id}` being registered with `permission_callback => '__return_true'`, which allows unauthenticated access. This makes it possible for unauthenticated attackers to write arbitrary JSON content to the server's publicly accessible upload directory via the vulnerable endpoint.

PLUGIN Hippoo Mobile App For Woocommerce

CVE-2025-12655

MEDIUM CVSS 5.3 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-14356 - Ultimate Addons For Contact Form 7 Plugin

The Ultra Addons for Contact Form 7 plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'uacf7_get_generated_pdf' function in all versions up to, and including, 3.5.33. This makes it possible for authenticated attackers, with Subscriber-level access and above, to generate and get form submission PDF, when the "PDF Generator" and the "Database" addons are enabled (disabled by default).

PLUGIN Ultimate Addons For Contact Form 7

CVE-2025-14356

MEDIUM CVSS 4.3 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-12570 - Fancy Product Designer Plugin

The Fancy Product Designer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.4.8 due to insufficient input sanitization and output escaping in the data-to-image.php and pdf-to-image.php files. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Fancy Product Designer

CVE-2025-12570

HIGH CVSS 7.2 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-14393 - Security Plugin

The Wpik WordPress Basic Ajax Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'dname' parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Security

CVE-2025-14393

MEDIUM CVSS 6.4 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-14467 - Wp Job Portal Plugin

The WP Job Portal plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.3.9. This is due to the plugin explicitly whitelisting the `` tag in its `WPJOBPORTAL_ALLOWED_TAGS` configuration and using insufficient input sanitization when saving job descriptions. This makes it possible for authenticated attackers, with Editor-level access and above, to inject arbitrary web scripts into job description fields via the job creation/editing interface. These scripts will execute whenever a user accesses an injected page, enabling session hijacking, credential theft, and other malicious…

PLUGIN Wp Job Portal

CVE-2025-14467

MEDIUM CVSS 4.4 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-14392 - Simple Theme Changer Plugin

The Simple Theme Changer plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the user_theme_admin, display_method_admin, and set_change_theme_button_name actions actions in all versions up to, and including, 1.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify the plugin's settings.

PLUGIN Simple Theme Changer

CVE-2025-14392

MEDIUM CVSS 4.3 2025-12-12
Threat Entry Updated 2025-12-12

CVE-2025-14344 - Gf Multi Uploader Plugin

The Multi Uploader for Gravity Forms plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'plupload_ajax_delete_file' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server.

PLUGIN Gf Multi Uploader

CVE-2025-14344

CRITICAL CVSS 9.8 2025-12-12
Scroll to top