Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,261
Critical855
High2,811
Medium10,399
Reset
Showing 1661-1680 of 14261 records
Threat Entry Updated 2026-01-13

CVE-2026-0837 - 进取 520W Plugin

A vulnerability was identified in UTT 进取 520W 1.7.7-180627. This affects the function strcpy of the file /goform/formFireWall. Such manipulation of the argument GroupName leads to buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN 进取 520W

CVE-2026-0837

HIGH CVSS 7.4 2026-01-11
Threat Entry Updated 2026-01-13

CVE-2026-0836 - 进取 520W Plugin

A vulnerability was determined in UTT 进取 520W 1.7.7-180627. The impacted element is the function strcpy of the file /goform/formConfigFastDirectionW. This manipulation of the argument ssid causes buffer overflow. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

PLUGIN 进取 520W

CVE-2026-0836

HIGH CVSS 7.4 2026-01-11
Threat Entry Updated 2026-02-23

CVE-2026-0824 - Ui Plugin

A security flaw has been discovered in questdb ui up to 1.11.9. Impacted is an unknown function of the component Web Console. The manipulation results in cross site scripting. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks. Upgrading to version 1.1.10 is recommended to address this issue. The patch is identified as b42fd9f18476d844ae181a10a249e003dafb823d. You should upgrade the affected component. The vendor confirmed early that the fix "is going to be released as a part of QuestDB 9.3.0" as…

PLUGIN Ui

CVE-2026-0824

MEDIUM CVSS 5.1 2026-01-10
Threat Entry Updated 2026-02-23

CVE-2026-0822 - Quickjs Plugin

A vulnerability was identified in quickjs-ng quickjs up to 0.11.0. This issue affects the function js_typed_array_sort of the file quickjs.c. The manipulation leads to heap-based buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used. The identifier of the patch is 53eefbcd695165a3bd8c584813b472cb4a69fbf5. To fix this issue, it is recommended to deploy a patch.

PLUGIN Quickjs

CVE-2026-0822

MEDIUM CVSS 5.3 2026-01-10
Threat Entry Updated 2026-01-13

CVE-2025-12379 - Auxin Elements Plugin

The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a combination of the 'tag' and ‘title_tag’ parameters in all versions up to, and including, 2.17.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Auxin Elements

CVE-2025-12379

MEDIUM CVSS 6.4 2026-01-10
Threat Entry Updated 2026-01-13

CVE-2025-13393 - Featured Image From Url Plugin

The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.3.1. This is due to insufficient validation of user-supplied URLs before passing them to the getimagesize() function in the Elementor widget integration. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services via the fifu_input_url parameter in the FIFU Elementor widget granted…

PLUGIN Featured Image From Url

CVE-2025-13393

MEDIUM CVSS 4.3 2026-01-10
Threat Entry Updated 2026-02-23

CVE-2026-0821 - Quickjs Plugin

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

PLUGIN Quickjs

CVE-2026-0821

MEDIUM CVSS 6.9 2026-01-10
Threat Entry Updated 2026-01-13

CVE-2025-14555 - Widget Countdown Plugin

The Countdown Timer – Widget Countdown plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpdevart_countdown' shortcode in all versions up to, and including, 2.7.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Widget Countdown

CVE-2025-14555

MEDIUM CVSS 6.4 2026-01-10
Threat Entry Updated 2026-01-13

CVE-2025-14506 - Convertforce Popup Builder Plugin

The ConvertForce Popup Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Gutenberg block's `entrance_animation` attribute in all versions up to, and including, 0.0.7. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Convertforce Popup Builder

CVE-2025-14506

MEDIUM CVSS 6.4 2026-01-10
Threat Entry Updated 2026-04-15

CVE-2026-0831 - Templately – Elementor & Gutenberg Template Library: 6500+ Free & Pro Ready Templates And Cloud! Plugin

The Templately plugin for WordPress is vulnerable to Arbitrary File Write in all versions up to, and including, 3.4.8. This is due to inadequate input validation in the `save_template_to_file()` function where user-controlled parameters like `session_id`, `content_id`, and `ai_page_ids` are used to construct file paths without proper sanitization. This makes it possible for unauthenticated attackers to write arbitrary `.ai.json` files to locations within the uploads directory.

PLUGIN Templately – Elementor & Gutenberg Template Library: 6500+ Free & Pro Ready Templates And Cloud!

CVE-2026-0831

MEDIUM CVSS 5.3 2026-01-10
Threat Entry Updated 2026-01-13

CVE-2025-14976 - User Registration Plugin

The User Registration & Membership – Custom Registration Form Builder, Custom Login Form, User Profile, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.4.8. This is due to missing or incorrect nonce validation on the 'process_row_actions' function with the 'delete' action. This makes it possible for unauthenticated attackers to delete arbitrary post via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN User Registration

CVE-2025-14976

MEDIUM CVSS 5.4 2026-01-10
Threat Entry Updated 2026-02-05

CVE-2026-22704 - Issues Plugin

HAX CMS helps manage microsite universe with PHP or NodeJs backends. In versions 11.0.6 to before 25.0.0, HAX CMS is vulnerable to stored XSS, which could lead to account takeover. This issue has been patched in version 25.0.0.

PLUGIN Issues

CVE-2026-22704

HIGH CVSS 8.0 2026-01-10
Threat Entry Updated 2026-02-05

CVE-2026-22777 - ComfyUI-Manager Plugin

ComfyUI-Manager is an extension designed to enhance the usability of ComfyUI. Prior to versions 3.39.2 and 4.0.5, an attacker can inject special characters into HTTP query parameters to add arbitrary configuration values to the config.ini file. This can lead to security setting tampering or modification of application behavior. This issue has been patched in versions 3.39.2 and 4.0.5.

PLUGIN ComfyUI-Manager

CVE-2026-22777

HIGH CVSS 7.5 2026-01-10
Threat Entry Updated 2026-01-27

CVE-2026-22773 - Vllm Plugin

vLLM is an inference and serving engine for large language models (LLMs). In versions from 0.6.4 to before 0.12.0, users can crash the vLLM engine serving multimodal models that use the Idefics3 vision model implementation by sending a specially crafted 1x1 pixel image. This causes a tensor dimension mismatch that results in an unhandled runtime error, leading to complete server termination. This issue has been patched in version 0.12.0.

PLUGIN Vllm

CVE-2026-22773

MEDIUM CVSS 6.5 2026-01-10
Threat Entry Updated 2026-01-13

CVE-2026-22705 - Signatures Plugin

RustCrypto: Signatures offers support for digital signatures, which provide authentication of data using public-key cryptography. Prior to version 0.1.0-rc.2, a timing side-channel was discovered in the Decompose algorithm which is used during ML-DSA signing to generate hints for the signature. This issue has been patched in version 0.1.0-rc.2.

PLUGIN Signatures

CVE-2026-22705

MEDIUM CVSS 6.4 2026-01-10
Threat Entry Updated 2026-02-05

CVE-2026-22703 - Cosign Plugin

Cosign provides code signing and transparency for containers and binaries. Prior to versions 2.6.2 and 3.0.4, Cosign bundle can be crafted to successfully verify an artifact even if the embedded Rekor entry does not reference the artifact's digest, signature or public key. When verifying a Rekor entry, Cosign verifies the Rekor entry signature, and also compares the artifact's digest, the user's public key from either a Fulcio certificate or provided by the user, and the artifact signature to the Rekor entry contents. Without these comparisons, Cosign would accept any response…

PLUGIN Cosign

CVE-2026-22703

MEDIUM CVSS 5.5 2026-01-10
Threat Entry Updated 2026-01-13

CVE-2025-14948 - Miniorange Otp Verification And Sms Notification For Woocommerce Plugin

The miniOrange OTP Verification and SMS Notification for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `enable_wc_sms_notification` AJAX action in all versions up to, and including, 4.3.8. This makes it possible for unauthenticated attackers to enable or disable SMS notification settings for WooCommerce orders.

PLUGIN Miniorange Otp Verification And Sms Notification For Woocommerce

CVE-2025-14948

MEDIUM CVSS 5.3 2026-01-10
Threat Entry Updated 2026-02-18

CVE-2026-22702 - Virtualenv Plugin

virtualenv is a tool for creating isolated virtual python environments. Prior to version 20.36.1, TOCTOU (Time-of-Check-Time-of-Use) vulnerabilities in virtualenv allow local attackers to perform symlink-based attacks on directory creation operations. An attacker with local access can exploit a race condition between directory existence checks and creation to redirect virtualenv's app_data and lock file operations to attacker-controlled locations. This issue has been patched in version 20.36.1.

PLUGIN Virtualenv

CVE-2026-22702

MEDIUM CVSS 4.5 2026-01-10
Threat Entry Updated 2026-01-13

CVE-2025-14943 - Blog2social Plugin

The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 8.7.2. This is due to a misconfigured authorization check on the 'getShipItemFullText' function which only verifies that a user has the 'read' capability (Subscriber-level) and a valid nonce, but fails to verify whether the user has permission to access the specific post being requested. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract data from password-protected, private, or draft posts.

PLUGIN Blog2social

CVE-2025-14943

MEDIUM CVSS 4.3 2026-01-10
Threat Entry Updated 2026-01-13

CVE-2026-22698 - Elliptic Curves Plugin

RustCrypto: Elliptic Curves is general purpose Elliptic Curve Cryptography (ECC) support, including types and traits for representing various elliptic curve forms, scalars, points, and public/secret keys composed thereof. In versions 0.14.0-pre.0 and 0.14.0-rc.0, a critical vulnerability exists in the SM2 Public Key Encryption (PKE) implementation where the ephemeral nonce k is generated with severely reduced entropy. A unit mismatch error causes the nonce generation function to request only 32 bits of randomness instead of the expected 256 bits. This reduces the security of the encryption from a 128-bit level to…

PLUGIN Elliptic Curves

CVE-2026-22698

HIGH CVSS 8.7 2026-01-10
Scroll to top