Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,244
Critical854
High2,808
Medium10,387
Reset
Showing 1001-1020 of 14244 records
Threat Entry Updated 2026-04-15

CVE-2026-1244 - Forms Bridge Plugin

The Forms Bridge – Infinite integrations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'id' shortcode attribute in the 'financoop_campaign' shortcode in all versions up to, and including, 4.2.5. This is due to insufficient input sanitization and output escaping on the user-supplied 'id' parameter in the forms_bridge_financoop_shortcode_error function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Forms Bridge

CVE-2026-1244

MEDIUM CVSS 6.4 2026-01-28
Threat Entry Updated 2026-04-15

CVE-2026-1310 - Simple Calendar For Elementor Plugin

The Simple calendar for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.6.6. This is due to missing capability checks on the `miga_ajax_editor_cal_delete` function that is hooked to the `miga_editor_cal_delete` AJAX action with both authenticated and unauthenticated access enabled. This makes it possible for unauthenticated attackers to delete arbitrary calendar entries by sending a request with a valid nonce and the calendar entry ID.

PLUGIN Simple Calendar For Elementor

CVE-2026-1310

MEDIUM CVSS 5.3 2026-01-28
Threat Entry Updated 2026-04-15

CVE-2026-0825 - Contact Form Entries Plugin

The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the CSV export functionality in all versions up to, and including, 1.4.5. This makes it possible for unauthenticated attackers to download sensitive form submission data containing personally identifiable information (PII) by accessing the CSV export endpoint with an export key that is exposed in publicly accessible page source code. The vulnerability is created because while the shortcode properly filters displayed entries by user, the CSV export handler…

PLUGIN Contact Form Entries

CVE-2026-0825

MEDIUM CVSS 5.3 2026-01-28
Threat Entry Updated 2026-01-29

CVE-2025-9082 - Wpbits Addons For Elementor Plugin

The WPBITS Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widget parameters in versions up to, and including, 1.8 due to insufficient input sanitization and output escaping when dynamic content is enabled. This makes it possible for authenticated attackers with contributor-level permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wpbits Addons For Elementor

CVE-2025-9082

MEDIUM CVSS 6.4 2026-01-28
Threat Entry Updated 2026-01-29

CVE-2025-14039 - Simple Folio Plugin

The Simple Folio plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_simple_folio_item_client_name' and '_simple_folio_item_link' meta fields in all versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Simple Folio

CVE-2025-14039

MEDIUM CVSS 6.4 2026-01-28
Threat Entry Updated 2026-01-29

CVE-2025-12709 - Create Interactive Experiences In The Block Editor Plugin

The Interactions – Create Interactive Experiences in the Block Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via event selectors in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Create Interactive Experiences In The Block Editor

CVE-2025-12709

MEDIUM CVSS 6.4 2026-01-28
Threat Entry Updated 2026-04-15

CVE-2026-1298 - Easy Replace Image Plugin

The Easy Replace Image plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.5.2. This is due to missing capability checks on the `image_replacement_from_url` function that is hooked to the `eri_from_url` AJAX action. This makes it possible for authenticated attackers, with Contributor-level access and above, to replace arbitrary image attachments on the site with images from external URLs, potentially enabling site defacement, phishing attacks, or content manipulation.

PLUGIN Easy Replace Image

CVE-2026-1298

MEDIUM CVSS 5.3 2026-01-28
Threat Entry Updated 2026-04-15

CVE-2026-1083 - Appointment Hour Booking Plugin

The Appointment Hour Booking – Booking Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form field configuration parameters in all versions up to, and including, 1.5.60 due to insufficient input sanitization and output escaping on the 'Min length/characters' and 'Max length/characters' field configuration values. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the form builder interface. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Appointment Hour Booking

CVE-2026-1083

MEDIUM CVSS 4.4 2026-01-28
Threat Entry Updated 2026-01-29

CVE-2025-14610 - Tablemaster For Elementor Plugin

The TableMaster for Elementor plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.6. This is due to the plugin not restricting which URLs can be fetched when importing CSV data from a URL in the Data Table widget. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations, including localhost and internal network services, and read sensitive files such as wp-config.php via the 'csv_url' parameter.

PLUGIN Tablemaster For Elementor

CVE-2025-14610

HIGH CVSS 7.2 2026-01-28
Threat Entry Updated 2026-01-29

CVE-2025-8072 - Brid Video Easy Publish Plugin

The Target Video Easy Publish plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘placeholder_img’ parameter in all versions up to, and including, 3.8.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Brid Video Easy Publish

CVE-2025-8072

MEDIUM CVSS 6.4 2026-01-28
Threat Entry Updated 2026-01-29

CVE-2025-13471 - User Activity Log Plugin

The User Activity Log WordPress plugin through 2.2 does not properly handle failed login attempts in some cases, allowing unauthenticated users to set arbitrary options to 1 (for example to enable User Registration when it has been turned off)

PLUGIN User Activity Log

CVE-2025-13471

MEDIUM CVSS 5.3 2026-01-28
Threat Entry Updated 2026-04-15

CVE-2026-0746 - AI Engine – The Chatbot and AI Framework for WordPress Plugin

The AI Engine plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.3.2 via the 'get_audio' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services, if "Public API" is enabled in the plugin settings, and 'allow_url_fopen' is set to 'On' on the server.

PLUGIN AI Engine – The Chatbot and AI Framework for WordPress

CVE-2026-0746

MEDIUM CVSS 6.4 2026-01-27
Threat Entry Updated 2026-01-27

CVE-2025-14971 - Invoice Payment For Woocommerce Plugin

The Link Invoice Payment for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the createPartialPayment and cancelPartialPayment functions in all versions up to, and including, 2.8.0. This makes it possible for unauthenticated attackers to create partial payments on any order or cancel any existing partial payment via ID enumeration.

PLUGIN Invoice Payment For Woocommerce

CVE-2025-14971

MEDIUM CVSS 5.3 2026-01-27
Threat Entry Updated 2026-01-27

CVE-2026-24656 - Apache Karaf Decanter Plugin

Deserialization of Untrusted Data vulnerability in Apache Karaf Decanter. The Decanter log socket collector exposes the port 4560, without authentication. If the collector exposes allowed classes property, this configuration can be bypassed. It means that the log socket collector is vulnerable to deserialization of untrusted data, eventually causing DoS. NB: Decanter log socket collector is not installed by default. Users who have not installed Decanter log socket are not impacted by this issue. This issue affects Apache Karaf Decanter before 2.12.0. Users are recommended to upgrade to version 2.12.0, which…

PLUGIN Apache Karaf Decanter

CVE-2026-24656

LOW CVSS 3.7 2026-01-26
Threat Entry Updated 2026-01-26

CVE-2025-14316 - Ahachat Messenger Marketing Plugin

The AhaChat Messenger Marketing WordPress plugin through 1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

PLUGIN Ahachat Messenger Marketing

CVE-2025-14316

HIGH CVSS 7.1 2026-01-26
Threat Entry Updated 2026-01-26

CVE-2025-14973 - Recipe Card Blocks Lite Plugin

The Recipe Card Blocks Lite WordPress plugin before 3.4.13 does not sanitize and escape a parameter before using it in a SQL statement, allowing contributors and above to perform SQL injection attacks.

PLUGIN Recipe Card Blocks Lite

CVE-2025-14973

MEDIUM CVSS 6.8 2026-01-26
Threat Entry Updated 2026-01-26

CVE-2025-6461 - All In One Dynamic Content Framework Plugin

The CubeWP – All-in-One Dynamic Content Framework plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.1.27 via the search feature in class-cubewp-search-ajax-hooks.php due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft posts that they should not have access to.

PLUGIN All In One Dynamic Content Framework

CVE-2025-6461

MEDIUM CVSS 4.3 2026-01-25
Threat Entry Updated 2026-04-15

CVE-2026-0593 - WP Go Maps (formerly WP Google Maps) Plugin

The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.

PLUGIN WP Go Maps (formerly WP Google Maps)

CVE-2026-0593

MEDIUM CVSS 5.3 2026-01-24
Threat Entry Updated 2026-04-15

CVE-2026-0862 - Save As Pdf Plugin By Pdfcrowd

The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is…

PLUGIN Save As Pdf Plugin By Pdfcrowd

CVE-2026-0862

MEDIUM CVSS 6.1 2026-01-24
Threat Entry Updated 2026-04-15

CVE-2026-0911 - Hustle – Email Marketing, Lead Generation, Optins, Popups Plugin

The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access…

PLUGIN Hustle – Email Marketing, Lead Generation, Optins, Popups

CVE-2026-0911

HIGH CVSS 7.5 2026-01-24
Scroll to top