Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total917
Critical917
High0
Medium0
Reset
Showing 201-220 of 917 records
Threat Entry Updated 2025-10-09

CVE-2025-11522 - Go Directory Wordpress Theme

The Search & Go - Directory WordPress Theme theme for WordPress is vulnerable to Authentication Bypass via account takeover in all versions up to, and including, 2.7. This is due to insufficient user validation in the search_and_go_elated_check_facebook_user() function This makes it possible for unauthenticated attackers to gain access to other user's accounts, including administrators, when Facebook login is enabled.

THEME Go Directory Wordpress Theme

CVE-2025-11522

CRITICAL CVSS 9.8 2025-10-09
Threat Entry Updated 2025-10-09

CVE-2025-7634 - Wp Travel Engine Plugin

The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 6.6.7 via the mode parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

PLUGIN Wp Travel Engine

CVE-2025-7634

CRITICAL CVSS 9.8 2025-10-09
Threat Entry Updated 2025-10-09

CVE-2025-7526 - Wp Travel Engine Plugin

The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to arbitrary file deletion (via renaming) due to insufficient file path validation in the set_user_profile_image function in all versions up to, and including, 6.6.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Wp Travel Engine

CVE-2025-7526

CRITICAL CVSS 9.8 2025-10-09
Threat Entry Updated 2025-10-09

CVE-2025-10586 - Community Events Plugin

The Community Events plugin for WordPress is vulnerable to SQL Injection via the ‘event_venue’ parameter in all versions up to, and including, 1.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Community Events

CVE-2025-10586

CRITICAL CVSS 9.8 2025-10-09
Threat Entry Updated 2025-10-08

CVE-2025-10587 - Community Events Plugin

The Community Events plugin for WordPress is vulnerable to SQL Injection via the event_category parameter in all versions up to, and including, 1.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Community Events

CVE-2025-10587

CRITICAL CVSS 9.8 2025-10-08
Threat Entry Updated 2025-10-06

CVE-2025-9485 - Miniorange Login With Eve Online Google Facebook Plugin

The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature in versions up to, and including, 6.26.12. This is due to the plugin performing unsafe JWT token processing without verification or validation in the `get_resource_owner_from_id_token` function. This makes it possible for unauthenticated attackers to bypass authentication and gain access to any existing user account - including administrators in certain configurations - or to create arbitrary subscriber-level accounts.

PLUGIN Miniorange Login With Eve Online Google Facebook

CVE-2025-9485

CRITICAL CVSS 9.8 2025-10-04
Threat Entry Updated 2025-10-06

CVE-2025-9286 - Appy Pie Connect For Woocommerce Plugin

The Appy Pie Connect for WooCommerce plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within the reset_user_password() REST handler in all versions up to, and including, 1.1.2. This makes it possible for unauthenticated attackers to to reset the password of arbitrary users, including administrators, thereby gaining administrative access.

PLUGIN Appy Pie Connect For Woocommerce

CVE-2025-9286

CRITICAL CVSS 9.8 2025-10-03
Threat Entry Updated 2025-10-06

CVE-2025-9209 - Restropress Plugin

The RestroPress – Online Food Ordering System plugin for WordPress is vulnerable to Authentication Bypass in versions 3.0.0 to 3.1.9.2. This is due to the plugin exposing user private tokens and API data via the /wp-json/wp/v2/users REST API endpoint. This makes it possible for unauthenticated attackers to forge JWT tokens for other users, including administrators, and authenticate as them.

PLUGIN Restropress

CVE-2025-9209

CRITICAL CVSS 9.8 2025-10-03
Threat Entry Updated 2025-10-06

CVE-2025-7721 - Joomsport Sports League Results Management Plugin

The JoomSport – for Sports: Team & League, Football, Hockey & more plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 5.7.3 via the task parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

PLUGIN Joomsport Sports League Results Management

CVE-2025-7721

CRITICAL CVSS 9.8 2025-10-03
Threat Entry Updated 2025-10-06

CVE-2025-10726 - Wprecovery Plugin

The WPRecovery plugin for WordPress is vulnerable to SQL Injection via the 'data[id]' parameter in all versions up to, and including, 2.0. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Additionally, the result of this SQL injection is passed directly to PHP's unlink() function, allowing attackers to delete arbitrary files…

PLUGIN Wprecovery

CVE-2025-10726

CRITICAL CVSS 9.1 2025-10-03
Threat Entry Updated 2025-10-06

CVE-2025-6388 - Spirit Framework Plugin

The Spirit Framework plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.2.14. This is due to the custom_actions() function not properly validating a user's identity prior to authenticating them to the site. This makes it possible for unauthenticated attackers to log in as any user, including administrators, granted they have access to the administrator's username.

PLUGIN Spirit Framework

CVE-2025-6388

CRITICAL CVSS 9.8 2025-10-03
Threat Entry Updated 2025-10-02

CVE-2025-9697 - Ajax Woosearch Plugin

The Ajax WooSearch WordPress plugin through 1.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection

PLUGIN Ajax Woosearch

CVE-2025-9697

CRITICAL CVSS 9.8 2025-10-02
Threat Entry Updated 2025-10-02

CVE-2025-9762 - Post By Email Plugin

The Post By Email plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the save_attachments function in all versions up to, and including, 1.0.4b. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Post By Email

CVE-2025-9762

CRITICAL CVSS 9.8 2025-09-30
Threat Entry Updated 2025-10-02

CVE-2025-8625 - Copypress Rest Api Plugin

The Copypress Rest API plugin for WordPress is vulnerable to Remote Code Execution via copyreap_handle_image() Function in versions 1.1 to 1.2. The plugin falls back to a hard-coded JWT signing key when no secret is defined and does not restrict which file types can be fetched and saved as attachments. As a result, unauthenticated attackers can forge a valid token to gain elevated privileges and upload an arbitrary file (e.g. a PHP script) through the image handler, leading to remote code execution.

PLUGIN Copypress Rest Api

CVE-2025-8625

CRITICAL CVSS 9.8 2025-09-30
Threat Entry Updated 2025-09-26

CVE-2025-60156 - WordPress Core

Cross-Site Request Forgery (CSRF) vulnerability in webandprint AR For WordPress allows Upload a Web Shell to a Web Server. This issue affects AR For WordPress: from n/a through 7.98.

CORE WordPress Core

CVE-2025-60156

CRITICAL CVSS 9.6 2025-09-26
Threat Entry Updated 2025-09-24

CVE-2025-9054 - Multiloca Woocommerce Multi Locations Inventory Management Plugin

The MultiLoca - WooCommerce Multi Locations Inventory Management plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'wcmlim_settings_ajax_handler' function in all versions up to, and including, 4.2.8. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

PLUGIN Multiloca Woocommerce Multi Locations Inventory Management

CVE-2025-9054

CRITICAL CVSS 9.8 2025-09-24
Threat Entry Updated 2025-09-24

CVE-2025-10412 - WooCommerce Plugin

The Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) plugin for WordPress is vulnerable to arbitrary file uploads due to misconfigured file type validation in the 'uni_cpo_upload_file' function in all versions up to, and including, 4.9.54. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN WooCommerce

CVE-2025-10412

CRITICAL CVSS 9.8 2025-09-23
Threat Entry Updated 2025-09-24

CVE-2025-10147 - Podlove Podcast Publisher Plugin

The Podlove Podcast Publisher plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'move_as_original_file' function in all versions up to, and including, 4.2.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Podlove Podcast Publisher

CVE-2025-10147

CRITICAL CVSS 9.8 2025-09-23
Threat Entry Updated 2025-09-24

CVE-2025-9321 - Wpcasa Plugin

The WPCasa plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 1.4.1. This is due to insufficient input validation and restriction on the 'api_requests' function. This makes it possible for unauthenticated attackers to call arbitrary functions and execute code.

PLUGIN Wpcasa

CVE-2025-9321

CRITICAL CVSS 9.8 2025-09-23
Threat Entry Updated 2025-09-19

CVE-2025-5948 - Service Finder Bookings Plugin

The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 6.0. This is due to the plugin not properly validating a user's identity prior to claiming a business when using the claim_business AJAX action. This makes it possible for unauthenticated attackers to login as any user including admins. Please note that subscriber privileges or brute-forcing are needed when completing the business takeover. The claim_id is needed to takeover the admin account, but brute-forcing is a practical approach to…

PLUGIN Service Finder Bookings

CVE-2025-5948

CRITICAL CVSS 9.8 2025-09-19
Scroll to top