Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,202
Critical852
High2,807
Medium10,348
Reset
Showing 661-680 of 14202 records
Threat Entry Updated 2026-02-19

CVE-2025-12882 - Clasifico Listing Plugin

The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set their own role by supplying the 'listing_user_role' parameter. This makes it possible for unauthenticated attackers to gain elevated privileges by registering an account with the administrator role.

PLUGIN Clasifico Listing

CVE-2025-12882

CRITICAL CVSS 9.8 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-12975 - Webappick Product Feed For Woocommerce Plugin

The CTX Feed – WooCommerce Product Feed Manager plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the woo_feed_plugin_installing() function in all versions up to, and including, 6.6.11. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install arbitrary plugins which can be leveraged to achieve remote code execution.

PLUGIN Webappick Product Feed For Woocommerce

CVE-2025-12975

HIGH CVSS 7.2 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-13048 - Official Statcounter Plugin For Wordpress

The StatCounter – Free Real Time Visitor Stats plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the user's Nickname in all versions up to, and including, 2.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Official Statcounter Plugin For Wordpress

CVE-2025-13048

MEDIUM CVSS 6.4 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-13079 - Popup Builder Plugin

The Popup Builder – Create highly converting, mobile friendly marketing popups. plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.4.2. This is due to the plugin generating predictable unsubscribe tokens using deterministic data. This makes it possible for unauthenticated attackers to unsubscribe arbitrary subscribers from mailing lists via brute-forcing the unsubscribe token, granted they know the victim's email address

PLUGIN Popup Builder

CVE-2025-13079

MEDIUM CVSS 5.3 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-12884 - Advanced Ads Plugin

The Advanced Ads – Ad Manager & AdSense plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 2.0.14. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `placement_update_item()` function. This makes it possible for authenticated attackers, with subscriber-level access and above, to update ad placements, allowing them to change which ad or ad group a placement serves.

PLUGIN Advanced Ads

CVE-2025-12884

MEDIUM CVSS 4.3 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-12845 - Fluent Plugin

The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to unauthorized access of data that leads to privilege escalation due to a missing capability check on the get_table_data() function in versions 0.5.4 to 1.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve plugin table data that can expose email log information. Attackers can leverage this on sites where the table log is enabled in order to trigger a password reset and obtain the reset key.

PLUGIN Fluent

CVE-2025-12845

HIGH CVSS 8.8 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-12707 - Library Management System Plugin

The Library Management System plugin for WordPress is vulnerable to SQL Injection via the 'bid' parameter in all versions up to, and including, 3.2.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Library Management System

CVE-2025-12707

HIGH CVSS 7.5 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-12448 - Smartsupp Live Chat Plugin

The Smartsupp – live chat, AI shopping assistant and chatbots plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'code' parameter in all versions up to, and including, 3.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Smartsupp Live Chat

CVE-2025-12448

MEDIUM CVSS 6.4 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-12451 - Easy Svg Plugin

The Easy SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Easy Svg

CVE-2025-12451

MEDIUM CVSS 6.1 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-12500 - Woocommerce Checkout Manager Plugin

The Checkout Field Manager (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to unauthenticated limited file upload in all versions up to, and including, 7.8.1. This is due to the plugin not properly verifying that a user is authorized to perform file upload actions via the "ajax_checkout_attachment_upload" function. This makes it possible for unauthenticated attackers to upload files to the server, though file types are limited to WordPress's default allowed MIME types (images, documents, etc.).

PLUGIN Woocommerce Checkout Manager

CVE-2025-12500

MEDIUM CVSS 5.3 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-12375 - Printful Shipping For Woocommerce Plugin

The Printful Integration for WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.2.11 via the advanced size chart REST API endpoint. This is due to insufficient validation of user-supplied URLs before passing them to the download_url() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.

PLUGIN Printful Shipping For Woocommerce

CVE-2025-12375

MEDIUM CVSS 6.4 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-12172 - Mailchimp List Subscribe Form Plugin

The Mailchimp List Subscribe Form plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.0. This is due to missing or incorrect nonce validation on the mailchimp_sf_change_list_if_necessary() function. This makes it possible for unauthenticated attackers to change Mailchimp lists via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Mailchimp List Subscribe Form

CVE-2025-12172

MEDIUM CVSS 4.3 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-12081 - Navz Photo Gallery Plugin

The ACF Photo Gallery Field plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the "acf_photo_gallery_edit_save" function in all versions up to, and including, 3.0. This makes it possible for authenticated attackers, with subscriber level access and above, to modify the title, caption, and custom metadata of arbitrary media attachments.

PLUGIN Navz Photo Gallery

CVE-2025-12081

MEDIUM CVSS 4.3 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-11754 - Gdpr Cookie Consent Plugin

The GDPR Cookie Consent plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'gdpr/v1/settings' REST API endpoint in all versions up to, and including, 4.1.2. This makes it possible for unauthenticated attackers to retrieve sensitive plugin settings including API tokens, email addresses, account IDs, and site keys.

PLUGIN Gdpr Cookie Consent

CVE-2025-11754

HIGH CVSS 7.5 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-11725 - Aruba Hispeed Cache Plugin

The Aruba HiSpeed Cache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability checks on the multiple functions in all versions up to, and including, 3.0.2. This makes it possible for unauthenticated attackers to modify plugin's configuration settings, enable or disable features, as well as enable/disable WordPress cron jobs or debug mode

PLUGIN Aruba Hispeed Cache

CVE-2025-11725

MEDIUM CVSS 6.5 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-12027 - Mesmerize Companion Plugin

The Mesmerize Companion plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the "openPageInCustomizer" and "openPageInDefaultEditor" functions in all versions up to, and including, 1.6.158. This makes it possible for authenticated attackers - with subscriber level access and above, on websites with the Mesmerize theme activated - to mark arbitrary pages as maintainable, wrap their content in custom sections, change page template metadata, and toggle the default editor flag without proper authorization.

PLUGIN Mesmerize Companion

CVE-2025-12027

MEDIUM CVSS 4.3 2026-02-19
Threat Entry Updated 2026-02-19

CVE-2025-11706 - Aruba Hispeed Cache Plugin

The Aruba HiSpeed Cache plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the dbstatus parameter in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Aruba Hispeed Cache

CVE-2025-11706

MEDIUM CVSS 6.1 2026-02-19
Threat Entry Updated 2026-04-15

CVE-2026-2230 - Booking Calendar Plugin

The Booking Calendar plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 10.14.14 via the handle_ajax_save function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, and booking permissions granted by an Administrator, to modify other users' plugin settings, such as booking calendar display options, which can disrupt the booking calendar functionality for the targeted user.

PLUGIN Booking Calendar

CVE-2026-2230

MEDIUM CVSS 4.3 2026-02-18
Threat Entry Updated 2026-04-15

CVE-2026-1426 - Advanced Ajax Product Filters Plugin

The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibility layer. This makes it possible for authenticated attackers, with Author-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is…

PLUGIN Advanced Ajax Product Filters

CVE-2026-1426

HIGH CVSS 8.8 2026-02-18
Threat Entry Updated 2026-04-15

CVE-2026-1404 - Ultimate Member Plugin

The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the filter parameters (e.g., 'filter_first_name') in all versions up to, and including, 2.11.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Ultimate Member

CVE-2026-1404

MEDIUM CVSS 6.1 2026-02-18
Scroll to top