Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,273
Critical855
High2,814
Medium10,408
Reset
Showing 4721-4740 of 14273 records
Threat Entry Updated 2025-08-08

CVE-2025-2797 - Woffice Plugin

The Woffice Core plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.4.21. This is due to missing or incorrect nonce validation on the 'woffice_handle_user_approval_actions' function. This makes it possible for unauthenticated attackers to approve registration for any user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Woffice

CVE-2025-2797

MEDIUM CVSS 5.4 2025-04-04
Threat Entry Updated 2025-08-08

CVE-2025-2780 - Woffice Plugin

The Woffice Core plugin for WordPress, used by the Woffice Theme, is vulnerable to arbitrary file uploads due to missing file type validation in the 'saveFeaturedImage' function in all versions up to, and including, 5.4.21. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Woffice

CVE-2025-2780

HIGH CVSS 8.8 2025-04-04
Threat Entry Updated 2025-04-07

CVE-2025-2836 - And User Login Plugin

The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘payment_method’ parameter in all versions up to, and including, 6.0.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN And User Login

CVE-2025-2836

MEDIUM CVSS 6.4 2025-04-04
Threat Entry Updated 2025-04-07

CVE-2025-2270 - Countdown Builder Plugin

The Countdown, Coming Soon, Maintenance – Countdown & Clock plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.8.9.1 via the createCdObj function. This makes it possible for unauthenticated attackers to include and execute files with the specific filenames on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in some cases.

PLUGIN Countdown Builder

CVE-2025-2270

HIGH CVSS 8.1 2025-04-04
Threat Entry Updated 2025-04-07

CVE-2025-2317 - Woo Product Filter Plugin

The Product Filter by WBW plugin for WordPress is vulnerable to time-based SQL Injection via the filtersDataBackend parameter in all versions up to, and including, 2.7.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Woo Product Filter

CVE-2025-2317

HIGH CVSS 7.5 2025-04-04
Threat Entry Updated 2025-04-29

CVE-2025-2279 - Maps Plugin

The Maps WordPress plugin through 1.0.6 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.

PLUGIN Maps

CVE-2025-2279

MEDIUM CVSS 5.9 2025-04-04
Threat Entry Updated 2025-04-07

CVE-2024-13898 - Announcements To The Top Or Bottom Of Your Website Plugin

The Simple Banner – Easily add multiple Banners/Bars/Notifications/Announcements to the top or bottom of your website plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Announcements To The Top Or Bottom Of Your Website

CVE-2024-13898

MEDIUM CVSS 4.4 2025-04-04
Threat Entry Updated 2025-04-07

CVE-2024-13645 - Tagdiv Composer Plugin

The tagDiv Composer plugin for WordPress is vulnerable to PHP Object Instantiation in all versions up to, and including, 5.3 via module parameter. This makes it possible for unauthenticated attackers to Instantiate a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform…

PLUGIN Tagdiv Composer

CVE-2024-13645

CRITICAL CVSS 9.8 2025-04-04
Threat Entry Updated 2025-04-09

CVE-2024-13708 - Booster For Woocommerce Plugin

The Booster for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in versions 4.0.1 to 7.2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Booster For Woocommerce

CVE-2024-13708

HIGH CVSS 7.2 2025-04-04
Threat Entry Updated 2025-08-08

CVE-2025-2075 - Uncanny Automator Plugin

The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 6.3.0.2. This is due to add_role() and user_role() functions missing proper capability checks performed through the validate_rest_call() function. This makes it possible for unauthenticated attackers to set the role of arbitrary users to administrator granting full access to the site, though privilege escalation requires an active account on the site so this is considered an authenticated privilege escalation.

PLUGIN Uncanny Automator

CVE-2025-2075

HIGH CVSS 8.8 2025-04-04
Threat Entry Updated 2025-04-09

CVE-2024-13744 - Booster For Woocommerce Plugin

The Booster for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the validate_product_input_fields_on_add_to_cart function in versions 4.0.1 to 7.2.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Booster For Woocommerce

CVE-2024-13744

HIGH CVSS 8.1 2025-04-04
Threat Entry Updated 2025-05-15

CVE-2025-2299 - Luckywp Table Of Contents Plugin

The LuckyWP Table of Contents plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.10. This is due to missing or incorrect nonce validation on the 'ajaxEdit' function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Luckywp Table Of Contents

CVE-2025-2299

MEDIUM CVSS 6.1 2025-04-03
Threat Entry Updated 2025-04-07

CVE-2025-2874 - Enable Users To Submit Posts From The Front End Plugin

The User Submitted Posts – Enable Users to Submit Posts from the Front End plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 20240319 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Enable Users To Submit Posts From The Front End

CVE-2025-2874

MEDIUM CVSS 4.4 2025-04-03
Threat Entry Updated 2025-04-10

CVE-2025-1663 - Unlimited Elements For Elementor Plugin

The Unlimited Elements For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 1.5.142 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Unlimited Elements For Elementor

CVE-2025-1663

MEDIUM CVSS 6.4 2025-04-03
Threat Entry Updated 2025-04-07

CVE-2024-13673 - Big Boom Directory Plugin

The Big Boom Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bbd-search' shortcode in all versions up to, and including, 2.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Big Boom Directory

CVE-2024-13673

MEDIUM CVSS 6.4 2025-04-03
Threat Entry Updated 2025-04-29

CVE-2025-2055 - Mappress Maps For Plugin

The MapPress Maps for WordPress plugin before 2.94.9 does not sanitise and escape some parameters when outputing them in the page, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks.

PLUGIN Mappress Maps For

CVE-2025-2055

MEDIUM CVSS 6.8 2025-04-03
Threat Entry Updated 2025-04-02

CVE-2025-3099 - Advanced Search By My Solr Server Plugin

The Advanced Search by My Solr Server plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.5. This is due to missing or incorrect nonce validation on the 'MySolrServerSettings' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Advanced Search By My Solr Server

CVE-2025-3099

MEDIUM CVSS 6.1 2025-04-02
Threat Entry Updated 2025-04-02

CVE-2025-3098 - Video Sidebar Widget Plugin

The Video Url plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'id' parameter in all versions up to, and including, 1.0.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Video Sidebar Widget

CVE-2025-3098

MEDIUM CVSS 6.1 2025-04-02
Threat Entry Updated 2025-08-12

CVE-2025-2005 - Front End Users Plugin

The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Front End Users

CVE-2025-2005

CRITICAL CVSS 9.8 2025-04-02
Scroll to top