Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,161
Critical851
High2,797
Medium10,318
Reset
Showing 381-400 of 14161 records
Threat Entry Updated 2026-03-12

CVE-2026-2987 - Simple Ajax Chat Plugin

The Simple Ajax Chat plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'c' parameter in versions up to, and including, 20260217 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Simple Ajax Chat

CVE-2026-2987

MEDIUM CVSS 6.1 2026-03-12
Threat Entry Updated 2026-04-15

CVE-2026-2687 - Reading Progressbar Plugin

The Reading progressbar WordPress plugin before 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

PLUGIN Reading Progressbar

CVE-2026-2687

MEDIUM CVSS 4.3 2026-03-12
Threat Entry Updated 2026-03-12

CVE-2026-3657 - My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu) Plugin

The My Sticky Bar plugin for WordPress is vulnerable to SQL injection via the `stickymenu_contact_lead_form` AJAX action in all versions up to, and including, 2.8.6. This is due to the handler using attacker-controlled POST parameter names directly as SQL column identifiers in `$wpdb->insert()`. While parameter values are sanitized with `esc_sql()` and `sanitize_text_field()`, the parameter keys are used as-is to build the column list in the INSERT statement. This makes it possible for unauthenticated attackers to inject SQL via crafted parameter names, enabling blind time-based data extraction from the database.

PLUGIN My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu)

CVE-2026-3657

HIGH CVSS 7.5 2026-03-12
Threat Entry Updated 2026-03-12

CVE-2026-3226 - LearnPress – WordPress LMS Plugin for Create and Sell Online Courses

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized email notification triggering due to missing capability checks on all 10 functions in the SendEmailAjax class in all versions up to, and including, 4.3.2.8. The AbstractAjax::catch_lp_ajax() dispatcher verifies a wp_rest nonce but performs no current_user_can() check before dispatching to handler functions. The wp_rest nonce is embedded in the frontend JavaScript for all authenticated users. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger arbitrary email notifications to admins, instructors, and users, enabling…

PLUGIN LearnPress – WordPress LMS Plugin for Create and Sell Online Courses

CVE-2026-3226

MEDIUM CVSS 4.3 2026-03-12
Threat Entry Updated 2026-03-12

CVE-2026-3496 - Jetbooking Plugin

The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'check_in_date' parameter in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Jetbooking

CVE-2026-3496

HIGH CVSS 7.5 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3178 - Name Directory Plugin

The Name Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'name_directory_name' parameter in all versions up to, and including, 1.32.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in versions 1.30.3 and 1.32.1.

PLUGIN Name Directory

CVE-2026-3178

HIGH CVSS 7.2 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3492 - Gravity Forms Plugin

The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.9.28.1. This is due to a compound failure involving missing authorization on the `create_from_template` AJAX endpoint (allowing any authenticated user to create forms), insufficient input sanitization (`sanitize_text_field()` preserves single quotes), and missing output escaping when the form title is rendered in the Form Switcher dropdown (`title` attribute constructed without `esc_attr()`, and JavaScript `saferHtml` utility only escapes `&`, `` but not quotes). This makes it possible for authenticated attackers, with Subscriber-level access…

PLUGIN Gravity Forms

CVE-2026-3492

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-1993 - ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin)

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Improper Privilege Management in versions 7.1.0 through 9.0.2. This is due to the `update_settings()` function accepting arbitrary plugin setting names without a whitelist of allowed settings. This makes it possible for authenticated attackers with the `exactmetrics_save_settings` capability to modify any plugin setting, including the `save_settings` option that controls which user roles have access to plugin functionality. The admin intended to delegate configuration access to a trusted user, not enable that user to delegate access to everyone. By setting…

PLUGIN ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin)

CVE-2026-1993

HIGH CVSS 8.8 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-1992 - ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin)

The ExactMetrics – Google Analytics Dashboard for WordPress plugin is vulnerable to Insecure Direct Object Reference in versions 8.6.0 through 9.0.2. This is due to the `store_settings()` method in the `ExactMetrics_Onboarding` class accepting a user-supplied `triggered_by` parameter that is used instead of the current user's ID to check permissions. This makes it possible for authenticated attackers with the `exactmetrics_save_settings` capability to bypass the `install_plugins` capability check by specifying an administrator's user ID in the `triggered_by` parameter, allowing them to install arbitrary plugins and achieve Remote Code Execution. This vulnerability only…

PLUGIN ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin)

CVE-2026-1992

HIGH CVSS 8.8 2026-03-11
Threat Entry Updated 2026-04-08

CVE-2026-3231 - Woo Checkout Field Editor Pro Plugin

The Checkout Field Editor (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via custom radio and checkboxgroup field values submitted through the WooCommerce Block Checkout Store API in all versions up to, and including, 2.1.7. This is due to the `prepare_single_field_data()` method in `class-thwcfd-block-order-data.php` first escaping values with `esc_html()` then immediately reversing the escaping with `html_entity_decode()` for radio and checkboxgroup field types, combined with a permissive `wp_kses()` allowlist in `get_allowed_html()` that explicitly permits the `` element with the `onchange` event handler attribute. This makes it…

PLUGIN Woo Checkout Field Editor Pro

CVE-2026-3231

HIGH CVSS 7.2 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-1454 - Lead Form Builder Plugin

The Responsive Contact Form Builder & Lead Generation Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0.1 via form field submissions. This is due to insufficient input sanitization in the lfb_lead_sanitize() function which omits certain field types from its sanitization whitelist, combined with an overly permissive wp_kses() filter at output time that allows onclick attributes on anchor tags. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator views the lead…

PLUGIN Lead Form Builder

CVE-2026-1454

HIGH CVSS 7.2 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3903 - And Backup Multiple Websites Plugin

The Modular DS: Monitor, update, and backup multiple websites plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.1. This is due to missing nonce validation on the postConfirmOauth() function. This makes it possible for unauthenticated attackers to disconnect the plugin's OAuth/SSO connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN And Backup Multiple Websites

CVE-2026-3903

MEDIUM CVSS 4.3 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-1708 - Simply Schedule Appointments Plugin

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_DB_Model` class failing to prevent the `append_where_sql` parameter from being passed through JSON request bodies, while only checking for its presence in the `$_REQUEST` superglobal. This makes it possible for unauthenticated attackers to append arbitrary SQL commands to queries and extract sensitive information from the database via the `append_where_sql` parameter in JSON payloads granted…

PLUGIN Simply Schedule Appointments

CVE-2026-1708

HIGH CVSS 7.5 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2918 - Happy Addons For Elementor Plugin

The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_condition_update` AJAX action. This is due to the `validate_reqeust()` method using `current_user_can('edit_posts', $template_id)` instead of `current_user_can('edit_post', $template_id)` — failing to perform object-level authorization. Additionally, the `ha_get_current_condition` AJAX action lacks a capability check. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify the display conditions of any published `ha_library` template. Because the `cond_to_html()` renderer outputs condition values into HTML attributes without…

PLUGIN Happy Addons For Elementor

CVE-2026-2918

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2917 - Happy Addons For Elementor Plugin

The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_duplicate_thing` admin action handler. This is due to the `can_clone()` method only checking `current_user_can('edit_posts')` (a general capability) without performing object-level authorization such as `current_user_can('edit_post', $post_id)`, and the nonce being tied to the generic action name `ha_duplicate_thing` rather than to a specific post ID. This makes it possible for authenticated attackers, with Contributor-level access and above, to clone any published post, page, or custom post type…

PLUGIN Happy Addons For Elementor

CVE-2026-2917

MEDIUM CVSS 5.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3534 - Astra Plugin

The Astra theme for WordPress is vulnerable to Stored Cross-Site Scripting via the `ast-page-background-meta` and `ast-content-background-meta` post meta fields in all versions up to, and including, 4.12.3. This is due to insufficient input sanitization on meta registration and missing output escaping in the `astra_get_responsive_background_obj()` function for four CSS-context sub-properties (`background-color`, `background-image`, `overlay-color`, `overlay-gradient`). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Astra

CVE-2026-3534

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-04-15

CVE-2026-2631 - Datalogics Ecommerce Delivery Plugin

The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication in a protected endpoint that allows users to perform arbitrary WordPress `update_option()` operations. Attackers can use this to enable registartion and to set the default role as Administrator.

PLUGIN Datalogics Ecommerce Delivery

CVE-2026-2631

CRITICAL CVSS 9.8 2026-03-11
Threat Entry Updated 2026-04-15

CVE-2026-2626 - Divi Booster Plugin

The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the use of unserialize() on the data, this could be further exploited when combined with a PHP gadget chain to achieve PHP Object Injection

PLUGIN Divi Booster

CVE-2026-2626

HIGH CVSS 8.1 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3222 - Wp Google Map Plugin

The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'location_id' parameter in all versions up to, and including, 4.9.1. This is due to the plugin's database abstraction layer (`FlipperCode_Model_Base::is_column()`) treating user input wrapped in backticks as column names, bypassing the `esc_sql()` escaping function. Additionally, the `wpgmp_ajax_call` AJAX handler (registered for unauthenticated users via `wp_ajax_nopriv`) allows calling arbitrary class methods including `wpgmp_return_final_capability`, which passes the unsanitized `location_id` GET parameter directly to a database query. This makes it possible for unauthenticated attackers to append additional SQL…

PLUGIN Wp Google Map

CVE-2026-3222

HIGH CVSS 7.5 2026-03-11
Threat Entry Updated 2026-04-15

CVE-2026-2466 - Dukapress Plugin

The DukaPress WordPress plugin through 3.2.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

PLUGIN Dukapress

CVE-2026-2466

HIGH CVSS 7.1 2026-03-11
Scroll to top