Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total917
Critical917
High0
Medium0
Reset
Showing 1-20 of 917 records
Threat Entry Updated 2026-04-15

CVE-2026-3461 - Visa Acceptance Solutions Plugin

The Visa Acceptance Solutions plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.1.0. This is due to the `express_pay_product_page_pay_for_order()` function logging users in based solely on a user-supplied billing email address during guest checkout for subscription products, without verifying email ownership, requiring a password, or validating a one-time token. This makes it possible for unauthenticated attackers to log in as any existing user, including administrators, by providing the target user's email address in the billing_details parameter, resulting in complete account takeover and site…

PLUGIN Visa Acceptance Solutions

CVE-2026-3461

CRITICAL CVSS 9.8 2026-04-15
Threat Entry Updated 2026-04-15

CVE-2026-1555 - Webstack Theme

The WebStack theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the io_img_upload() function in all versions up to, and including, 1.2024. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

THEME Webstack

CVE-2026-1555

CRITICAL CVSS 9.8 2026-04-15
Threat Entry Updated 2026-04-14

CVE-2026-4365 - Learnpress Plugin

The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function in all versions up to, and including, 4.3.2.8. The plugin exposes a `wp_rest` nonce in public frontend HTML (`lpData`) to unauthenticated visitors, and uses that nonce as the only security gate for the `lp-load-ajax` AJAX dispatcher. The `delete_question_answer` action has no capability or ownership check. This makes it possible for unauthenticated attackers to delete any quiz answer option by sending a crafted POST request with a publicly available nonce.

PLUGIN Learnpress

CVE-2026-4365

CRITICAL CVSS 9.1 2026-04-14
Threat Entry Updated 2026-04-15

CVE-2026-34424 - WordPress Core

Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system that allows unauthenticated attackers to execute arbitrary code and commands. Attackers can trigger pre-authentication remote shell execution via HTTP headers, establish authenticated backdoors accepting arbitrary PHP code or OS commands, create hidden administrator accounts, exfiltrate credentials and access keys, and maintain persistence through multiple injection points including must-use plugins and core file modifications.

CORE WordPress Core

CVE-2026-34424

CRITICAL CVSS 9.3 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-1830 - Quick Playground Plugin

The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server.

PLUGIN Quick Playground

CVE-2026-1830

CRITICAL CVSS 9.8 2026-04-09
Threat Entry Updated 2026-04-08

CVE-2026-2942 - Prosolution Wp Client Plugin

The ProSolution WP Client plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'proSol_fileUploadProcess' function in all versions up to, and including, 1.9.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Prosolution Wp Client

CVE-2026-2942

CRITICAL CVSS 9.8 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-3535 - Dsgvo Google Web Fonts Gdpr Plugin

The DSGVO Google Web Fonts GDPR plugin for WordPress is vulnerable to arbitrary file upload due to missing file type validation in the `DSGVOGWPdownloadGoogleFonts()` function in all versions up to, and including, 1.1. The function is exposed via a `wp_ajax_nopriv_` hook, requiring no authentication. It fetches a user-supplied URL as a CSS file, extracts URLs from its content, and downloads those files to a publicly accessible directory without validating the file type. This makes it possible for unauthenticated attackers to upload arbitrary files including PHP webshells, leading to remote code…

PLUGIN Dsgvo Google Web Fonts Gdpr

CVE-2026-3535

CRITICAL CVSS 9.8 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4003 - Userspn Plugin

The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalation via Arbitrary User Meta Update in all versions up to and including 1.1.15. This is due to a flawed authorization logic check in the userspn_ajax_nopriv_server() function within the 'userspn_form_save' case. The conditional only blocks unauthenticated users when the user_id is empty, but when a non-empty user_id is supplied, execution bypasses this check entirely and proceeds to update arbitrary user meta via update_user_meta() without any authentication or authorization verification. Additionally, the nonce required for this AJAX endpoint ('userspn-nonce')…

PLUGIN Userspn

CVE-2026-4003

CRITICAL CVSS 9.8 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-3296 - Everest Forms Plugin

The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.4.3 via deserialization of untrusted input from form entry metadata. This is due to the html-admin-page-entries-view.php file calling PHP's native unserialize() on stored entry meta values without passing the allowed_classes parameter. This makes it possible for unauthenticated attackers to inject a serialized PHP object payload through any public Everest Forms form field. The payload survives sanitize_text_field() sanitization (serialization control characters are not stripped) and is stored in the wp_evf_entrymeta database table.…

PLUGIN Everest Forms

CVE-2026-3296

CRITICAL CVSS 9.8 2026-04-08
Threat Entry Updated 2026-04-07

CVE-2026-0740 - Ninja Forms File Uploads Plugin

The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The vulnerability was partially patched in version 3.3.25 and fully patched in version 3.3.27.

PLUGIN Ninja Forms File Uploads

CVE-2026-0740

CRITICAL CVSS 9.8 2026-04-07
Threat Entry Updated 2026-04-01

CVE-2026-3300 - Everest Forms Plugin

The Everest Forms Pro plugin for WordPress is vulnerable to Remote Code Execution via PHP Code Injection in all versions up to, and including, 1.9.12. This is due to the Calculation Addon's process_filter() function concatenating user-submitted form field values into a PHP code string without proper escaping before passing it to eval(). The sanitize_text_field() function applied to input does not escape single quotes or other PHP code context characters. This makes it possible for unauthenticated attackers to inject and execute arbitrary PHP code on the server by submitting a crafted…

PLUGIN Everest Forms

CVE-2026-3300

CRITICAL CVSS 9.8 2026-03-31
Threat Entry Updated 2026-04-01

CVE-2026-4257 - Contact Form By Supsystic Plugin

The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_String` template engine without sandboxing, combined with the `cfsPreFill` prefill functionality that allows unauthenticated users to inject arbitrary Twig expressions into form field values via GET parameters. This makes it possible for unauthenticated attackers to execute arbitrary PHP functions and OS commands on the server by leveraging Twig's `registerUndefinedFilterCallback()` method to register…

PLUGIN Contact Form By Supsystic

CVE-2026-4257

CRITICAL CVSS 9.8 2026-03-30
Threat Entry Updated 2026-04-08

CVE-2026-4484 - Learning Management System Plugin

The Masteriyo LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.6. This is due to the plugin allowing a user to update the user role through the 'InstructorsController::prepare_object_for_database' function. This makes it possible for authenticated attackers, with Student-level access and above, to elevate their privileges to that of an administrator.

PLUGIN Learning Management System

CVE-2026-4484

CRITICAL CVSS 9.8 2026-03-26
Threat Entry Updated 2026-03-24

CVE-2026-4283 - Shapepress Dsgvo Plugin

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for unauthenticated attackers to permanently destroy any non-administrator user account (password randomized, username/email overwritten, roles stripped, comments anonymized, sensitive usermeta wiped) by submitting the victim's email address with `process_now=1`. The nonce required for the request is publicly…

PLUGIN Shapepress Dsgvo

CVE-2026-4283

CRITICAL CVSS 9.1 2026-03-24
Threat Entry Updated 2026-03-24

CVE-2026-4001 - Woocommerce Custom Product Addons Pro Plugin

The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.4.1 via the custom pricing formula eval() in the process_custom_formula() function within includes/process/price.php. This is due to insufficient sanitization and validation of user-submitted field values before passing them to PHP's eval() function. The sanitize_values() method strips HTML tags but does not escape single quotes or prevent PHP code injection. This makes it possible for unauthenticated attackers to execute arbitrary code on the server by submitting a crafted value…

PLUGIN Woocommerce Custom Product Addons Pro

CVE-2026-4001

CRITICAL CVSS 9.8 2026-03-24
Threat Entry Updated 2026-03-23

CVE-2026-3584 - Kali Forms — Contact Form & Drag-and-Drop Builder Plugin

The Kali Forms plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.4.9 via the 'form_process' function. This is due to the 'prepare_post_data' function mapping user-supplied keys directly into internal placeholder storage, combined with the use of 'call_user_func' on these placeholder values. This makes it possible for unauthenticated attackers to execute code on the server.

PLUGIN Kali Forms — Contact Form & Drag-and-Drop Builder

CVE-2026-3584

CRITICAL CVSS 9.8 2026-03-20
Threat Entry Updated 2026-03-20

CVE-2026-4038 - Aimogen Pro Plugin

The Aimogen Pro plugin for WordPress is vulnerable to Arbitrary Function Call that can lead to privilege escalation due to a missing capability check on the 'aiomatic_call_ai_function_realtime' function in all versions up to, and including, 2.7.5. This makes it possible for unauthenticated attackers to call arbitrary WordPress functions such as 'update_option' to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

PLUGIN Aimogen Pro

CVE-2026-4038

CRITICAL CVSS 9.8 2026-03-20
Threat Entry Updated 2026-04-08

CVE-2026-2991 - Kivicare Clinic Management System Plugin

The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 4.1.2. This is due to the `patientSocialLogin()` function not verifying the social provider access token before authenticating a user. This makes it possible for unauthenticated attackers to log in as any patient registered on the system by providing only their email address and an arbitrary value for the access token, bypassing all credential verification. The attacker gains access to sensitive medical records, appointments, prescriptions, and billing…

PLUGIN Kivicare Clinic Management System

CVE-2026-2991

CRITICAL CVSS 9.8 2026-03-18
Threat Entry Updated 2026-03-16

CVE-2026-3891 - Pix For Woocommerce Plugin

The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' function in all versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Pix For Woocommerce

CVE-2026-3891

CRITICAL CVSS 9.8 2026-03-13
Threat Entry Updated 2026-04-15

CVE-2026-2631 - Datalogics Ecommerce Delivery Plugin

The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication in a protected endpoint that allows users to perform arbitrary WordPress `update_option()` operations. Attackers can use this to enable registartion and to set the default role as Administrator.

PLUGIN Datalogics Ecommerce Delivery

CVE-2026-2631

CRITICAL CVSS 9.8 2026-03-11
Scroll to top