Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,273
Critical855
High2,814
Medium10,408
Reset
Showing 3921-3940 of 14273 records
Threat Entry Updated 2025-07-16

CVE-2025-5817 - Amazon Products To Woocommerce Plugin

The Amazon Products to WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.7 via the wcta2w_get_urls(). This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Amazon Products To Woocommerce

CVE-2025-5817

HIGH CVSS 7.2 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-5339 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘bsa_pro_id’ parameter in all versions up to, and including, 4.89 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ads Pro

CVE-2025-5339

HIGH CVSS 7.5 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-4689 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion which leads to Remote Code Execution in all versions up to, and including, 4.89. This is due to the presence of a SQL Injection vulnerability and Local File Inclusion vulnerability that can be chained with an image upload. This makes it possible for unauthenticated attackers to execute code on the server upload image files on the server than can be fetched via a SQL injection vulnerability, and ultimately executed as PHP code…

PLUGIN Ads Pro

CVE-2025-4689

CRITICAL CVSS 9.8 2025-07-02
Threat Entry Updated 2025-07-03

CVE-2025-4654 - Soumettre Fr Plugin

The Soumettre.fr plugin for WordPress is vulnerable to unauthorized access and modification of data due to a improper authorization checks on the make_signature function in all versions up to, and including, 2.1.5. This makes it possible for unauthenticated attackers to create/edit/delete Soumettre posts. This vulnerability affects only installations where the soumettre account is not connected (i.e. API key is not installed)

PLUGIN Soumettre Fr

CVE-2025-4654

LOW CVSS 3.7 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-4381 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to SQL Injection via the ‘$id’ variable of the getSpace() function in all versions up to, and including, 4.89 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ads Pro

CVE-2025-4381

HIGH CVSS 7.5 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-4380 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the…

PLUGIN Ads Pro

CVE-2025-4380

HIGH CVSS 8.1 2025-07-02
Threat Entry Updated 2025-07-16

CVE-2024-11405 - Wp Front End Login And Register Plugin

The WP Front-end login and register plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the email and wpmp_reset_password_token parameters in all versions up to, and including, 2.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Wp Front End Login And Register

CVE-2024-11405

MEDIUM CVSS 6.1 2025-07-02
Threat Entry Updated 2025-09-30

CVE-2025-5692 - Lead Form Data Collection To Crm Plugin

The Lead Form Data Collection to CRM plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the ~/includes/LB_admin_ajax.php file in all versions up to, and including, 3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform several actions like updating settings. Initially this CVE was assigned specifically to all AJAX actions and the doFieldAjaxAction() function, however it was determined that CVE-2025-47690 is assigned to the doFieldAjaxAction() function that leads to arbitrary options updates.

PLUGIN Lead Form Data Collection To Crm

CVE-2025-5692

MEDIUM CVSS 6.3 2025-07-02
Threat Entry Updated 2025-07-03

CVE-2025-5314 - 3d Flipbook Dflip Lite Plugin

The Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer plugin for WordPress is vulnerable to DOM-Based Reflected Cross-Site Scripting via the ‘pdf-source’ parameter in all versions up to, and including, 2.3.65 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN 3d Flipbook Dflip Lite

CVE-2025-5314

MEDIUM CVSS 6.1 2025-07-01
Threat Entry Updated 2025-07-16

CVE-2025-6756 - Ultimate Addons For Contact Form 7 Plugin

The Ultra Addons for Contact Form 7 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's UACF7_CUSTOM_FIELDS shortcode in all versions up to, and including, 3.5.21 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Ultimate Addons For Contact Form 7

CVE-2025-6756

MEDIUM CVSS 6.4 2025-07-01
Threat Entry Updated 2025-07-03

CVE-2025-6934 - Opal Estate Pro Plugin

The Opal Estate Pro – Property Management and Submission plugin for WordPress, used by the FullHouse - Real Estate Responsive WordPress Theme, is vulnerable to privilege escalation via in all versions up to, and including, 1.7.5. This is due to a lack of role restriction during registration in the 'on_regiser_user' function. This makes it possible for unauthenticated attackers to arbitrarily choose the role, including the Administrator role, assigned when registering.

PLUGIN Opal Estate Pro

CVE-2025-6934

CRITICAL CVSS 9.8 2025-07-01
Threat Entry Updated 2025-07-01

CVE-2025-5730 - Contact Form Plugin

The Contact Form Plugin WordPress plugin before 1.1.29 does not sanitise and escape some of its settings, which could allow high privilege users such as contributor to perform Stored Cross-Site Scripting attacks.

PLUGIN Contact Form

CVE-2025-5730

MEDIUM CVSS 4.3 2025-06-30
Threat Entry Updated 2025-07-01

CVE-2025-3745 - Wp Lightbox 2 Plugin

The WP Lightbox 2 WordPress plugin before 3.0.6.8 does not correctly sanitize the value of the title attribute of links before using them, which may allow malicious users to conduct XSS attacks.

PLUGIN Wp Lightbox 2

CVE-2025-3745

MEDIUM CVSS 6.3 2025-06-30
Threat Entry Updated 2025-07-08

CVE-2025-6462 - Ez Sql Reports Shortcode Widget And Db Backup Plugin

The EZ SQL Reports Shortcode Widget and DB Backup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's SQLREPORT shortcode in all versions up to, and including, 5.25.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Ez Sql Reports Shortcode Widget And Db Backup

CVE-2025-6462

MEDIUM CVSS 6.4 2025-06-29
Threat Entry Updated 2025-07-08

CVE-2025-5937 - Micropayments Plugin

The MicroPayments – Fans Paysite: Paid Creator Subscriptions, Digital Assets, Wallet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.0. This is due to missing or incorrect nonce validation on the adminOptions() function. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Micropayments

CVE-2025-5937

MEDIUM CVSS 4.3 2025-06-28
Threat Entry Updated 2025-07-07

CVE-2025-6755 - Game Users Share Button Plugin

The Game Users Share Buttons plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajaxDeleteTheme() function in all versions up to, and including, 1.3.0. This makes it possible for Subscriber-level attackers to add arbitrary file paths (such as ../../../../wp-config.php) to the themeNameId parameter of the AJAX request, which can lead to remote code execution.

PLUGIN Game Users Share Button

CVE-2025-6755

HIGH CVSS 8.8 2025-06-28
Threat Entry Updated 2025-07-07

CVE-2025-5304 - Pt Project Notebooks Plugin

The PT Project Notebooks plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the wpnb_pto_new_users_add() function in versions 1.0.0 through 1.1.3. This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator.

PLUGIN Pt Project Notebooks

CVE-2025-5304

CRITICAL CVSS 9.8 2025-06-28
Threat Entry Updated 2025-07-07

CVE-2025-6252 - Qi Addons For Elementor Plugin

The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in all versions up to, and including, 1.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Qi Addons For Elementor

CVE-2025-6252

MEDIUM CVSS 6.4 2025-06-28
Threat Entry Updated 2025-07-07

CVE-2025-6381 - Vidmov Plugin

The BeeTeam368 Extensions plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_remove_temp_file() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.

PLUGIN Vidmov

CVE-2025-6381

HIGH CVSS 8.8 2025-06-28
Threat Entry Updated 2025-07-07

CVE-2025-6379 - Vidmov Plugin

The BeeTeam368 Extensions Pro plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_live_fn() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.

PLUGIN Vidmov

CVE-2025-6379

HIGH CVSS 8.8 2025-06-28
Scroll to top