Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,261
Critical855
High2,811
Medium10,399
Reset
Showing 1121-1140 of 14261 records
Threat Entry Updated 2026-01-26

CVE-2025-15043 - The Events Calendar Plugin

The The Events Calendar plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'start_migration', 'cancel_migration', and 'revert_migration' functions in all versions up to, and including, 6.15.13. This makes it possible for authenticated attackers, with subscriber level access and above, to start, cancel, or revert the Custom Tables V1 database migration, including dropping the custom database tables entirely via the revert action.

PLUGIN The Events Calendar

CVE-2025-15043

MEDIUM CVSS 5.4 2026-01-20
Threat Entry Updated 2026-01-26

CVE-2025-14533 - Acf Extended Plugin

The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 0.9.2.1. This is due to the 'insert_user' function not restricting the roles with which a user can register. This makes it possible for unauthenticated attackers to supply the 'administrator' role during registration and gain administrator access to the site. Note: The vulnerability can only be exploited if 'role' is mapped to the custom field.

PLUGIN Acf Extended

CVE-2025-14533

CRITICAL CVSS 9.8 2026-01-20
Threat Entry Updated 2026-04-15

CVE-2026-1045 - Viet Contact Plugin

The Viet contact plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Viet Contact

CVE-2026-1045

MEDIUM CVSS 4.4 2026-01-20
Threat Entry Updated 2026-04-15

CVE-2026-1042 - Wp Hello Bar Plugin

The WP Hello Bar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'digit_one' and 'digit_two' parameters in all versions up to, and including, 1.02 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wp Hello Bar

CVE-2026-1042

MEDIUM CVSS 4.4 2026-01-20
Threat Entry Updated 2026-01-26

CVE-2025-14977 - Dokan Lite Plugin

The Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 4.2.4 via the `/wp-json/dokan/v1/settings` REST API endpoint due to missing validation on a user-controlled key. This makes it possible for authenticated attackers, with customer-level permissions and above, to read or modify other vendors' store settings including sensitive payment information (PayPal email, bank account details, routing numbers, IBAN, SWIFT codes), phone numbers, and addresses, and change PayPal email addresses to…

PLUGIN Dokan Lite

CVE-2025-14977

HIGH CVSS 8.1 2026-01-20
Threat Entry Updated 2026-01-26

CVE-2025-14348 - And Automation Plugin

The weMail - Email Marketing, Lead Generation, Optin Forms, Email Newsletters, A/B Testing, and Automation plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 2.0.7. This is due to the plugin's REST API trusting the `x-wemail-user` HTTP header to identify users without verifying the request originates from an authenticated WordPress session. This makes it possible for unauthenticated attackers who know or can guess an admin email (easily enumerable via `/wp-json/wp/v2/users`) to impersonate that user and access the CSV subscriber endpoints, potentially exfiltrating subscriber PII…

PLUGIN And Automation

CVE-2025-14348

MEDIUM CVSS 5.3 2026-01-20
Threat Entry Updated 2026-01-26

CVE-2025-14798 - Wordpress Lms Plugin

The LearnPress – WordPress LMS Plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.3.2.4 via the get_item_permissions_check function. This makes it possible for unauthenticated attackers to extract sensitive data including user first names and last names. Other information such as social profile links and enrollment are also included.

PLUGIN Wordpress Lms

CVE-2025-14798

MEDIUM CVSS 5.3 2026-01-20
Threat Entry Updated 2026-01-26

CVE-2025-14351 - Custom Fonts Plugin

The Custom Fonts – Host Your Fonts Locally plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'BCF_Google_Fonts_Compatibility' class constructor function in all versions up to, and including, 2.1.16. This makes it possible for unauthenticated attackers to delete font directory and rewrite theme.json file.

PLUGIN Custom Fonts

CVE-2025-14351

MEDIUM CVSS 5.3 2026-01-20
Threat Entry Updated 2026-04-15

CVE-2026-1051 - Newsletter – Send awesome emails from WordPress Plugin

The Newsletter – Send awesome emails from WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 9.1.0. This is due to missing or incorrect nonce validation on the hook_newsletter_action() function. This makes it possible for unauthenticated attackers to unsubscribe newsletter subscribers via a forged request granted they can trick a logged-in user into performing an action such as clicking on a link.

PLUGIN Newsletter – Send awesome emails from WordPress

CVE-2026-1051

MEDIUM CVSS 4.3 2026-01-20
Threat Entry Updated 2026-01-26

CVE-2025-14978 - Peachpay For Woocommerce Plugin

The PeachPay — Payments & Express Checkout for WooCommerce (supports Stripe, PayPal, Square, Authorize.net) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability checks on the ConvesioPay webhook REST endpoint in all versions up to, and including, 1.119.8. This makes it possible for unauthenticated attackers to modify the status of arbitrary WooCommerce orders.

PLUGIN Peachpay For Woocommerce

CVE-2025-14978

MEDIUM CVSS 5.3 2026-01-20
Threat Entry Updated 2026-01-26

CVE-2025-15466 - Image Photo Gallery Final Tiles Grid Plugin

The Image Photo Gallery Final Tiles Grid plugin for WordPress is vulnerable to unauthorized access and modification of data due to missing capability checks on multiple AJAX actions in all versions up to, and including, 3.6.9. This makes it possible for authenticated attackers, with Contributor-level access and above, to view, create, modify, clone, delete, and reassign ownership of galleries created by other users, including administrators.

PLUGIN Image Photo Gallery Final Tiles Grid

CVE-2025-15466

MEDIUM CVSS 5.4 2026-01-20
Threat Entry Updated 2026-03-09

CVE-2026-22850 - Koko Analytics Is An Open Source Analytics Plugin

Koko Analytics is an open-source analytics plugin for WordPress. Versions prior to 2.1.3 are vulnerable to arbitrary SQL execution through unescaped analytics export/import and permissive admin SQL import. Unauthenticated visitors can submit arbitrary path (`pa`) and referrer (`r`) values to the public tracking endpoint in src/Resources/functions/collect.php, which stores those strings verbatim in the analytics tables. The admin export logic in src/Admin/Data_Export.php writes these stored values directly into SQL INSERT statements without escaping. A crafted path such as "),('999','x');DROP TABLE wp_users;-- breaks out of the value list. When an administrator later…

PLUGIN Koko Analytics Is An Open Source Analytics

CVE-2026-22850

HIGH CVSS 8.3 2026-01-19
Threat Entry Updated 2026-02-06

CVE-2026-1133 - KSOA Plugin

A vulnerability was determined in Yonyou KSOA 9.0. The impacted element is an unknown function of the file /kmf/folder.jsp of the component HTTP GET Parameter Handler. Executing a manipulation of the argument folderid can lead to sql injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1133

MEDIUM CVSS 6.9 2026-01-19
Threat Entry Updated 2026-02-06

CVE-2026-1132 - KSOA Plugin

A vulnerability was found in Yonyou KSOA 9.0. The affected element is an unknown function of the file /kmf/edit_folder.jsp of the component HTTP GET Parameter Handler. Performing a manipulation of the argument folderid results in sql injection. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1132

MEDIUM CVSS 6.9 2026-01-19
Threat Entry Updated 2026-02-10

CVE-2026-1131 - KSOA Plugin

A vulnerability has been found in Yonyou KSOA 9.0. Impacted is an unknown function of the file /kmc/save_catalog.jsp of the component HTTP GET Parameter Handler. Such manipulation of the argument catalogid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1131

MEDIUM CVSS 6.9 2026-01-19
Threat Entry Updated 2026-02-10

CVE-2026-1130 - KSOA Plugin

A flaw has been found in Yonyou KSOA 9.0. This issue affects some unknown processing of the file /worksheet/worksadd_plan.jsp of the component HTTP GET Parameter Handler. This manipulation of the argument ID causes sql injection. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1130

MEDIUM CVSS 6.9 2026-01-19
Threat Entry Updated 2026-02-10

CVE-2026-1129 - KSOA Plugin

A vulnerability was detected in Yonyou KSOA 9.0. This vulnerability affects unknown code of the file /worksheet/worksadd.jsp of the component HTTP GET Parameter Handler. The manipulation of the argument ID results in sql injection. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN KSOA

CVE-2026-1129

MEDIUM CVSS 6.9 2026-01-19
Threat Entry Updated 2026-02-23

CVE-2026-23829 - Mailpit Plugin

Mailpit is an email testing tool and API for developers. Prior to version 1.28.3, Mailpit's SMTP server is vulnerable to Header Injection due to an insufficient Regular Expression used to validate `RCPT TO` and `MAIL FROM` addresses. An attacker can inject arbitrary SMTP headers (or corrupt existing ones) by including carriage return characters (`\r`) in the email address. This header injection occurs because the regex intended to filter control characters fails to exclude `\r` and `\n` when used inside a character class. Version 1.28.3 fixes this issue.

PLUGIN Mailpit

CVE-2026-23829

MEDIUM CVSS 5.3 2026-01-19
Threat Entry Updated 2026-02-18

CVE-2026-23644 - esm.sh Plugin

esm.sh is a no-build content delivery network (CDN) for web development. Prior to Go pseeudoversion 0.0.0-20260116051925-c62ab83c589e, the software has a path traversal vulnerability due to an incomplete fix. `path.Clean` normalizes a path but does not prevent absolute paths in a malicious tar file. Commit https://github.com/esm-dev/esm.sh/commit/9d77b88c320733ff6689d938d85d246a3af9af16, corresponding to pseudoversion 0.0.0-20260116051925-c62ab83c589e, fixes this issue.

PLUGIN esm.sh

CVE-2026-23644

HIGH CVSS 7.7 2026-01-18
Scroll to top