Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total920
Critical920
High0
Medium0
Reset
Showing 601-620 of 920 records
Threat Entry Updated 2024-11-21

CVE-2024-5150 - Login With Phone Number Plugin

The Login with phone number plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.26. This is due to the 'activation_code' default value is empty, and the not empty check is missing in the 'lwp_ajax_register' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user email. The vulnerability is patched in version 1.7.26, but there is an issue in the patch that causes the entire function…

PLUGIN Login With Phone Number

CVE-2024-5150

CRITICAL CVSS 9.8 2024-05-29
Threat Entry Updated 2024-11-21

CVE-2024-4544 - Pie Register Plugin

The Pie Register - Social Sites Login (Add on) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.7. This is due to insufficient verification on the user being supplied during a social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.

PLUGIN Pie Register

CVE-2024-4544

CRITICAL CVSS 9.8 2024-05-24
Threat Entry Updated 2025-02-27

CVE-2024-5084 - Hash Form Plugin

The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Hash Form

CVE-2024-5084

CRITICAL CVSS 9.8 2024-05-23
Threat Entry Updated 2024-11-21

CVE-2024-3495 - Country State City Auto Dropdown Plugin

The Country State City Dropdown CF7 plugin for WordPress is vulnerable to SQL Injection via the ‘cnt’ and 'sid' parameters in versions up to, and including, 2.7.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Country State City Auto Dropdown

CVE-2024-3495

CRITICAL CVSS 9.8 2024-05-22
Threat Entry Updated 2025-02-05

CVE-2024-5147 - Wpzoom Elementor Addons Plugin

The WPZOOM Addons for Elementor (Templates, Widgets) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.37 via the 'grid_style' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

PLUGIN Wpzoom Elementor Addons

CVE-2024-5147

CRITICAL CVSS 9.8 2024-05-22
Threat Entry Updated 2025-07-07

CVE-2024-4443 - Business Directory Plugin

The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘listingfields’ parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Business Directory

CVE-2024-4443

CRITICAL CVSS 9.8 2024-05-22
Threat Entry Updated 2025-04-18

CVE-2024-4442 - Salon Booking System Plugin

The Salon booking system plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 9.8. This is due to the plugin not properly validating the path of an uploaded file prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible.

PLUGIN Salon Booking System

CVE-2024-4442

CRITICAL CVSS 9.1 2024-05-21
Threat Entry Updated 2025-02-06

CVE-2024-2771 - Contact Form Plugin

The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the /wp-json/fluentform/v1/managers REST API endpoint in all versions up to, and including, 5.1.16. This makes it possible for unauthenticated attackers to grant users with Fluent Form management permissions which gives them access to all of the plugin's settings and features. This also makes it possible for unauthenticated attackers to delete manager accounts.

PLUGIN Contact Form

CVE-2024-2771

CRITICAL CVSS 9.8 2024-05-18
Threat Entry Updated 2024-11-21

CVE-2024-31290 - WordPress Core

Improper Privilege Management vulnerability in CodeRevolution Demo My WordPress allows Privilege Escalation.This issue affects Demo My WordPress: from n/a through 1.0.9.1.

CORE WordPress Core

CVE-2024-31290

CRITICAL CVSS 9.8 2024-05-17
Threat Entry Updated 2024-11-21

CVE-2024-3551 - Penci Soledad Data Migrator Plugin

The Penci Soledad Data Migrator plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.0 via the 'data' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. This is limited to just PHP files.

PLUGIN Penci Soledad Data Migrator

CVE-2024-3551

CRITICAL CVSS 9.8 2024-05-17
Threat Entry Updated 2025-01-24

CVE-2024-4223 - Tutor Lms Plugin

The Tutor LMS plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on multiple functions in all versions up to, and including, 2.7.0. This makes it possible for unauthenticated attackers to add, modify, or delete data.

PLUGIN Tutor Lms

CVE-2024-4223

CRITICAL CVSS 9.8 2024-05-16
Threat Entry Updated 2024-11-21

CVE-2024-4560 - Chatbot Chatgpt Plugin

The Kognetiks Chatbot for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the chatbot_chatgpt_upload_file_to_assistant function in all versions up to, and including, 1.9.9. This makes it possible for unauthenticated attackers, with to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Chatbot Chatgpt

CVE-2024-4560

CRITICAL CVSS 9.8 2024-05-14
Threat Entry Updated 2025-01-15

CVE-2024-4434 - Learnpress Plugin

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the ‘term_id’ parameter in versions up to, and including, 4.2.6.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Learnpress

CVE-2024-4434

CRITICAL CVSS 9.8 2024-05-14
Threat Entry Updated 2024-11-21

CVE-2024-4413 - Motopress Hotel Booking Lite Plugin

The Hotel Booking Lite plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.11.1 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

PLUGIN Motopress Hotel Booking Lite

CVE-2024-4413

CRITICAL CVSS 9.8 2024-05-14
Threat Entry Updated 2024-11-21

CVE-2024-3806 - Porto Theme

The Porto theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 7.1.0 via the 'porto_ajax_posts' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included.

THEME Porto

CVE-2024-3806

CRITICAL CVSS 9.8 2024-05-14
Threat Entry Updated 2024-11-21

CVE-2024-3070 - Last Viewed Posts By Wpbeginner Plugin

The Last Viewed Posts by WPBeginner plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0.0 via deserialization of untrusted input from the LastViewedPosts Cookie. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

PLUGIN Last Viewed Posts By Wpbeginner

CVE-2024-3070

CRITICAL CVSS 9.8 2024-05-14
Threat Entry Updated 2024-11-21

CVE-2024-32700 - WordPress Core

Unrestricted Upload of File with Dangerous Type vulnerability in Kognetiks Kognetiks Chatbot for WordPress.This issue affects Kognetiks Chatbot for WordPress: from n/a through 2.0.0.

CORE WordPress Core

CVE-2024-32700

CRITICAL CVSS 10.0 2024-05-14
Threat Entry Updated 2024-11-21

CVE-2024-4393 - Social Connect Plugin

The Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.2. This is due to insufficient verification on the OpenID server being supplied during the social login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.

PLUGIN Social Connect

CVE-2024-4393

CRITICAL CVSS 9.8 2024-05-08
Threat Entry Updated 2024-11-21

CVE-2024-4346 - Startklar Elementor Addons Plugin

The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 1.7.13. This is due to the plugin not properly validating the path of an uploaded file prior to deleting it. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible.

PLUGIN Startklar Elementor Addons

CVE-2024-4346

CRITICAL CVSS 9.1 2024-05-07
Threat Entry Updated 2024-11-21

CVE-2024-4345 - Startklar Elementor Addons Plugin

The Startklar Elementor Addons plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'process' function in the 'startklarDropZoneUploadProcess' class in versions up to, and including, 1.7.13. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Startklar Elementor Addons

CVE-2024-4345

CRITICAL CVSS 9.8 2024-05-07
Scroll to top