Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,273
Critical855
High2,814
Medium10,408
Reset
Showing 2961-2980 of 14273 records
Threat Entry Updated 2025-11-04

CVE-2025-11755 - Delicious Recipes Plugin

The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file uploads when importing recipes via CSV in all versions up to, and including, 1.9.0. This flaw allows an attacker with at least Contributor-level permissions to upload a malicious PHP file by providing a remote URL during a recipe import process, leading to Remote Code Execution (RCE).

PLUGIN Delicious Recipes

CVE-2025-11755

HIGH CVSS 8.8 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-6574 - Service Finder Bookings Plugin

The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and excluding, 6.1. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

PLUGIN Service Finder Bookings

CVE-2025-6574

HIGH CVSS 8.8 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-12137 - Jc Importer Plugin

The Import WP – Export and Import CSV and XML files to WordPress plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.14.16. This is due to the plugin's REST API endpoint accepting arbitrary absolute file paths without proper validation in the 'attach_file()' function when handling 'file_local' actions. This makes it possible for authenticated attackers, with administrator-level access and above, to read arbitrary files on the server's filesystem, including sensitive configuration files and system files via the 'local_url' parameter.

PLUGIN Jc Importer

CVE-2025-12137

MEDIUM CVSS 4.9 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11499 - Fluent Plugin

The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_featured_image_from_external_url() function in all versions up to, and including, 1.1.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible in configurations where unauthenticated users have been provided with a method for adding featured images, and the workflow trigger is created.

PLUGIN Fluent

CVE-2025-11499

CRITICAL CVSS 9.8 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-10487 - Adsense Plugin

The Advanced Ads – Ad Manager & AdSense plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.12 via the select_one() function. This is due to the endpoint not properly restricting access to the AJAX endpoint or limiting the functions that can be called to safe functions. This makes it possible for unauthenticated attackers to call arbitrary functions beginning with get_the_ like get_the_excerpt which can make information exposure possible.

PLUGIN Adsense

CVE-2025-10487

HIGH CVSS 7.3 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-12090 - Meet The Team Plugin

The Employee Spotlight – Team Member Showcase & Meet the Team Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Social URLs in all versions up to, and including, 5.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Meet The Team

CVE-2025-12090

MEDIUM CVSS 6.4 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-12180 - Qi Blocks Plugin

The Qi Blocks plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.4.3. This is due to the plugin storing arbitrary CSS styles submitted via the `qi-blocks/v1/update-styles` REST API endpoint without proper sanitization in the `update_global_styles_callback()` function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary CSS, which can be used to perform actions such as hiding content, overlaying fake UI elements, or exfiltrating sensitive information via CSS injection techniques.

PLUGIN Qi Blocks

CVE-2025-12180

MEDIUM CVSS 4.3 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-12038 - Folderly Plugin

The Folderly plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the /wp-json/folderly/v1/config/clear-all-data REST API endpoint in all versions up to, and including, 0.3. This makes it possible for authenticated attackers, with Author-level access and above, to clear all data like terms and categories.

PLUGIN Folderly

CVE-2025-12038

MEDIUM CVSS 4.3 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11740 - Wpforo Forum Plugin

The wpForo Forum plugin for WordPress is vulnerable to SQL Injection via the Subscriptions Manager in all versions up to, and including, 2.4.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Wpforo Forum

CVE-2025-11740

MEDIUM CVSS 6.5 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11983 - Wp Discourse Plugin

The WP Discourse plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.5.9. This is due to the plugin unconditionally sending Discourse API credentials (Api-Key and Api-Username headers) to any host specified in a post's discourse_permalink custom field during comment synchronization. This makes it possible for authenticated attackers, with author-level access and above, to exfiltrate sensitive Discourse API credentials to attacker-controlled servers, as well as query internal services and potentially perform further attacks.

PLUGIN Wp Discourse

CVE-2025-11983

MEDIUM CVSS 4.3 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11502 - Schema And Structured Data For Wp Plugin

The Schema & Structured Data for WP & AMP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'saswp_tiny_multiple_faq' shortcode in all versions up to, and including, 1.51 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Schema And Structured Data For Wp

CVE-2025-11502

MEDIUM CVSS 6.4 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-5949 - Service Finder Bookings Plugin

The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's identity prior to processing a password change request. This makes it possible for authenticated attackers with subscriber access or higher to reset other users' passwords, including those of admins.

PLUGIN Service Finder Bookings

CVE-2025-5949

HIGH CVSS 8.8 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11995 - Community Events Plugin

The Community Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via event details parameter in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Community Events

CVE-2025-11995

HIGH CVSS 7.2 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-12118 - Schema Scalpel Plugin

The Schema Scalpel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the post title in all versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping when outputting user-supplied data into JSON-LD schema markup. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Schema Scalpel

CVE-2025-12118

MEDIUM CVSS 6.4 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11927 - Nazy Load Plugin

The Flying Images: Optimize and Lazy Load Images for Faster Page Speed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Nazy Load

CVE-2025-11927

MEDIUM CVSS 4.4 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11377 - List Category Posts Plugin

The List category posts plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 0.92.0 via the 'catlist' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.

PLUGIN List Category Posts

CVE-2025-11377

MEDIUM CVSS 4.3 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-12367 - Seo Simplified Plugin

The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 1.3.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with Author-level access and above, to enable or disable arbitrary SiteSEO features that they should not have access to.

PLUGIN Seo Simplified

CVE-2025-12367

MEDIUM CVSS 4.3 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11928 - Javascript Toolbox Plugin

The CSS & JavaScript Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 12.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Javascript Toolbox

CVE-2025-11928

MEDIUM CVSS 4.4 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11833 - Mobile App Plugin

The Post SMTP – Complete SMTP Solution with Logs, Alerts, Backup SMTP & Mobile App plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the __construct function in all versions up to, and including, 3.6.0. This makes it possible for unauthenticated attackers to read arbitrary logged emails sent through the Post SMTP plugin, including password reset emails containing password reset links, which can lead to account takeover.

PLUGIN Mobile App

CVE-2025-11833

CRITICAL CVSS 9.8 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11920 - Wpcom Member Plugin

The WPCOM Member plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.7.14 via the action parameter in one of its shortcodes. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

PLUGIN Wpcom Member

CVE-2025-11920

HIGH CVSS 8.8 2025-11-01
Scroll to top