Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,273
Critical855
High2,814
Medium10,408
Reset
Showing 2601-2620 of 14273 records
Threat Entry Updated 2025-11-25

CVE-2025-12025 - Easy Youtube Subscribe Plugin

The YouTube Subscribe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Easy Youtube Subscribe

CVE-2025-12025

MEDIUM CVSS 4.4 2025-11-25
Threat Entry Updated 2025-11-25

CVE-2025-13559 - Edukart Pro Plugin

The EduKart Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'edukart_pro_register_user_front_end' function not restricting what user roles a user can register with. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site.

PLUGIN Edukart Pro

CVE-2025-13559

CRITICAL CVSS 9.8 2025-11-25
Threat Entry Updated 2026-01-16

CVE-2025-13558 - Blog2social Plugin

The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'deleteUserCcDraftPost' function in all versions up to, and including, 8.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change the status of arbitrary posts to trash.

PLUGIN Blog2social

CVE-2025-13558

MEDIUM CVSS 5.4 2025-11-25
Threat Entry Updated 2025-11-25

CVE-2025-13068 - Telegram Bot Plugin

The Telegram Bot & Channel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Telegram username in all versions up to, and including, 4.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Telegram Bot

CVE-2025-13068

HIGH CVSS 7.2 2025-11-25
Threat Entry Updated 2025-11-25

CVE-2025-10646 - Search Exclude Plugin

The Search Exclude plugin for WordPress is vulnerable to unauthorized modification of data due to a insufficient capability check on the Base::get_rest_permission() method in all versions up to, and including, 2.5.7. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify plugin settings, such as adding arbitrary posts to the search exclusion list.

PLUGIN Search Exclude

CVE-2025-10646

MEDIUM CVSS 4.3 2025-11-25
Threat Entry Updated 2025-11-25

CVE-2025-6389 - Sneeit Framework Plugin

The Sneeit Framework plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 8.3 via the sneeit_articles_pagination_callback() function. This is due to the function accepting user input and then passing that through call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server which can be leveraged to inject backdoors or, for example, create new administrative user accounts.

PLUGIN Sneeit Framework

CVE-2025-6389

CRITICAL CVSS 9.8 2025-11-25
Threat Entry Updated 2025-11-25

CVE-2025-10144 - Perfect Woocommerce Brands Plugin

The Perfect Brands for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the `brands` attribute of the `products` shortcode in all versions up to, and including, 3.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Perfect Woocommerce Brands

CVE-2025-10144

MEDIUM CVSS 6.5 2025-11-24
Threat Entry Updated 2025-11-25

CVE-2025-12629 - Broken Link Manager Plugin

The Broken Link Manager WordPress plugin through 0.6.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

PLUGIN Broken Link Manager

CVE-2025-12629

HIGH CVSS 7.1 2025-11-24
Threat Entry Updated 2025-11-25

CVE-2025-12569 - Front Editor Plugin

The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.0 does not validate a parameter before redirecting the user to its value, leading to an Open Redirect issue

PLUGIN Front Editor

CVE-2025-12569

MEDIUM CVSS 4.7 2025-11-24
Threat Entry Updated 2025-11-25

CVE-2024-14015 - Wordpress Ecommerce Plugin

The WordPress eCommerce Plugin WordPress plugin through 2.9.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

PLUGIN Wordpress Ecommerce

CVE-2024-14015

HIGH CVSS 7.1 2025-11-24
Threat Entry Updated 2025-11-25

CVE-2025-12394 - Backup Migration Plugin

The Backup Migration WordPress plugin before 2.0.0 does not properly generate its backup path in certain server configurations, allowing unauthenticated users to fetch a log that discloses the backup filename. The backup archive is then downloadable without authentication.

PLUGIN Backup Migration

CVE-2025-12394

MEDIUM CVSS 5.9 2025-11-24
Threat Entry Updated 2025-11-25

CVE-2025-7402 - Ads Pro Plugin Multi Purpose Wordpress Advertising Manager

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘site_id’ parameter in all versions up to, and including, 4.95 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ads Pro Plugin Multi Purpose Wordpress Advertising Manager

CVE-2025-7402

HIGH CVSS 7.5 2025-11-24
Threat Entry Updated 2025-11-25

CVE-2025-12800 - Shortcodes Ultimate Plugin

The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 7.4.5 via the su_shortcode_csv_table function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. If the 'Unsafe features' option is explicitly enabled by an administrator, this issue becomes exploitable by Contributor+ attackers

PLUGIN Shortcodes Ultimate

CVE-2025-12800

MEDIUM CVSS 6.4 2025-11-23
Threat Entry Updated 2025-11-25

CVE-2025-13526 - Oneclick Whatsapp Order Plugin

The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL.

PLUGIN Oneclick Whatsapp Order

CVE-2025-13526

HIGH CVSS 7.5 2025-11-22
Threat Entry Updated 2025-11-25

CVE-2025-13318 - Booking Calendar Contact Form Plugin

The Booking Calendar Contact Form plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.2.60. This is due to missing authorization checks and payment verification in the `dex_bccf_check_IPN_verification` function. This makes it possible for unauthenticated attackers to arbitrarily confirm bookings and bypass payment requirements via the 'dex_bccf_ipn' parameter.

PLUGIN Booking Calendar Contact Form

CVE-2025-13318

MEDIUM CVSS 5.3 2025-11-22
Threat Entry Updated 2025-11-25

CVE-2025-13136 - Gsheetconnector For Ninja Forms Plugin

The GSheetConnector For Ninja Forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'njform-google-sheet-config ' page in all versions up to, and including, 2.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve information about the system.

PLUGIN Gsheetconnector For Ninja Forms

CVE-2025-13136

MEDIUM CVSS 4.3 2025-11-22
Threat Entry Updated 2025-11-25

CVE-2025-13384 - Cp Contact Form With Paypal Plugin

The CP Contact Form with PayPal plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.56. This is due to the plugin exposing an unauthenticated IPN-like endpoint (via the 'cp_contactformpp_ipncheck' query parameter) that processes payment confirmations without any authentication, nonce verification, or PayPal IPN signature validation. This makes it possible for unauthenticated attackers to mark form submissions as paid without making actual payments by sending forged payment notification requests with arbitrary POST data (payment_status, txn_id, payer_email).

PLUGIN Cp Contact Form With Paypal

CVE-2025-13384

HIGH CVSS 7.5 2025-11-22
Threat Entry Updated 2025-11-25

CVE-2025-13317 - Appointment Booking Calendar Plugin

The Appointment Booking Calendar plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.96. This is due to the plugin exposing an unauthenticated booking processing endpoint (cpabc_appointments_check_IPN_verification) that trusts attacker-supplied payment notifications without verifying their origin, authenticity, or requiring proper authorization checks. This makes it possible for unauthenticated attackers to arbitrarily confirm bookings and insert them into the live calendar via the 'cpabc_ipncheck' parameter, triggering administrative and customer notification emails and disrupting operations.

PLUGIN Appointment Booking Calendar

CVE-2025-13317

MEDIUM CVSS 5.3 2025-11-22
Threat Entry Updated 2025-12-04

CVE-2025-12877 - Idonate Plugin

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized modification od data due to a missing capability check on the panding_blood_request_action() function in all versions up to, and including, 2.1.15. This makes it possible for unauthenticated attackers to delete arbitrary posts.

PLUGIN Idonate

CVE-2025-12877

MEDIUM CVSS 5.3 2025-11-22
Scroll to top