Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total920
Critical920
High0
Medium0
Reset
Showing 621-640 of 920 records
Threat Entry Updated 2024-11-21

CVE-2024-4186 - Build App Online Plugin

The Build App Online plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.0.5. This is due to the 'eb_user_email_verification_key' default value is empty, and the not empty check is missing in the 'eb_user_email_verify' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id. This can only be exploited if the 'Email Verification' setting is enabled.

PLUGIN Build App Online

CVE-2024-4186

CRITICAL CVSS 9.8 2024-05-07
Threat Entry Updated 2025-06-05

CVE-2024-3729 - Frontend Admin Plugin

The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to improper missing encryption exception handling on the 'fea_encrypt' function in all versions up to, and including, 3.19.4. This makes it possible for unauthenticated attackers to manipulate the user processing forms, which can be used to add and edit administrator user for privilege escalation, or to automatically log in users for authentication bypass, or manipulate the post processing form that can be used to inject arbitrary web scripts. This can only be exploited if the 'openssl' php extension is not…

PLUGIN Frontend Admin

CVE-2024-3729

CRITICAL CVSS 9.8 2024-05-02
Threat Entry Updated 2024-11-21

CVE-2024-2876 - Woocommerce Plugin

The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'run' function of the 'IG_ES_Subscribers_Query' class in all versions up to, and including, 5.7.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Woocommerce

CVE-2024-2876

CRITICAL CVSS 9.8 2024-05-02
Threat Entry Updated 2025-02-06

CVE-2024-2667 - Instawp Connect Plugin

The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files.

PLUGIN Instawp Connect

CVE-2024-2667

CRITICAL CVSS 9.8 2024-05-02
Threat Entry Updated 2024-11-21

CVE-2024-3342 - Timetable And Event Schedule By Motopress Plugin

The Timetable and Event Schedule by MotoPress plugin for WordPress is vulnerable to SQL Injection via the 'events' attribute of the 'mp-timetable' shortcode in all versions up to, and including, 2.4.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Timetable And Event Schedule By Motopress

CVE-2024-3342

CRITICAL CVSS 9.9 2024-04-27
Threat Entry Updated 2025-02-07

CVE-2024-3962 - Product Addons Fields For Woocommerce Plugin

The Product Addons & Fields for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ppom_upload_file function in all versions up to, and including, 32.0.18. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires the PPOM Pro plugin to be installed along with a WooCommerce product that contains a file upload field to retrieve the correct nonce.

PLUGIN Product Addons Fields For Woocommerce

CVE-2024-3962

CRITICAL CVSS 9.8 2024-04-26
Threat Entry Updated 2025-01-17

CVE-2024-3136 - Masterstudy Lms Plugin

The MasterStudy LMS plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.3 via the 'template' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

PLUGIN Masterstudy Lms

CVE-2024-3136

CRITICAL CVSS 9.8 2024-04-09
Threat Entry Updated 2024-11-21

CVE-2024-2804 - Network Summary Plugin

The Network Summary plugin for WordPress is vulnerable to SQL Injection via the 'category' parameter in all versions up to, and including, 2.0.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Network Summary

CVE-2024-2804

CRITICAL CVSS 9.8 2024-04-09
Threat Entry Updated 2025-01-31

CVE-2024-1813 - Simple Job Board Plugin

The Simple Job Board plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.11.0 via deserialization of untrusted input in the job_board_applicant_list_columns_value function. This makes it possible for unauthenticated attackers to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code when a submitted job application is viewed.

PLUGIN Simple Job Board

CVE-2024-1813

CRITICAL CVSS 9.8 2024-04-09
Threat Entry Updated 2025-03-17

CVE-2024-2879 - Layerslider Plugin

The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Layerslider

CVE-2024-2879

CRITICAL CVSS 9.8 2024-04-03
Threat Entry Updated 2024-11-21

CVE-2024-2086 - Integrate Google Drive – Browse, Upload, Download, Embed, Play, Share, Gallery, and Manage Your Google Drive Files into Your WordPress Site Plugin

The Integrate Google Drive – Browse, Upload, Download, Embed, Play, Share, Gallery, and Manage Your Google Drive Files Into Your WordPress Site plugin for WordPress is vulnerable to unauthorized access of data, modification of data, and loss of data due to a missing capability check on multiple AJAX in all versions up to, and including, 1.3.8. This makes it possible for authenticated attackers to modify plugin settings as well as allowing full read/write/delete access to the Google Drive associated with the plugin.

PLUGIN Integrate Google Drive – Browse, Upload, Download, Embed, Play, Share, Gallery, and Manage Your Google Drive Files into Your WordPress Site

CVE-2024-2086

CRITICAL CVSS 10.0 2024-03-30
Threat Entry Updated 2025-02-13

CVE-2024-2411 - Masterstudy Lms Plugin

The MasterStudy LMS plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.3.0 via the 'modal' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

PLUGIN Masterstudy Lms

CVE-2024-2411

CRITICAL CVSS 9.8 2024-03-29
Threat Entry Updated 2025-02-13

CVE-2024-2409 - Masterstudy Lms Plugin

The MasterStudy LMS plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.3.1. This is due to insufficient validation checks within the _register_user() function called by the 'wp_ajax_nopriv_stm_lms_register' AJAX action. This makes it possible for unauthenticated attackers to register a user with administrator-level privileges when MasterStudy LMS Pro is installed and the LMS Forms Editor add-on is enabled.

PLUGIN Masterstudy Lms

CVE-2024-2409

CRITICAL CVSS 9.8 2024-03-29
Threat Entry Updated 2024-11-21

CVE-2024-1711 - Create By Mediavine Plugin

The Create by Mediavine plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 1.9.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Create By Mediavine

CVE-2024-1711

CRITICAL CVSS 9.8 2024-03-20
Threat Entry Updated 2024-11-21

CVE-2024-2172 - Malware Scanner Plugin

The Malware Scanner plugin and the Web Application Firewall plugin for WordPress (both by MiniOrange) are vulnerable to privilege escalation due to a missing capability check on the mo_wpns_init() function in all versions up to, and including, 4.7.2 (for Malware Scanner) and 2.1.1 (for Web Application Firewall). This makes it possible for unauthenticated attackers to escalate their privileges to that of an administrator.

PLUGIN Malware Scanner

CVE-2024-2172

CRITICAL CVSS 9.8 2024-03-13
Threat Entry Updated 2025-03-05

CVE-2024-1071 - Ultimate Member Plugin

The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to SQL Injection via the 'sorting' parameter in versions 2.1.3 to 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ultimate Member

CVE-2024-1071

CRITICAL CVSS 9.8 2024-03-13
Threat Entry Updated 2025-01-21

CVE-2023-6825 - File Manager Plugin

The File Manager and File Manager Pro plugins for WordPress are vulnerable to Directory Traversal in versions up to, and including version 7.2.1 (free version) and 8.3.4 (Pro version) via the target parameter in the mk_file_folder_manager_action_callback_shortcode function. This makes it possible for attackers to read the contents of arbitrary files on the server, which can contain sensitive information and to upload files into directories other than the intended directory for file uploads. The free version requires Administrator access for this vulnerability to be exploitable. The Pro version allows a file…

PLUGIN File Manager

CVE-2023-6825

CRITICAL CVSS 9.9 2024-03-13
Threat Entry Updated 2025-01-16

CVE-2024-1981 - Migration Backup Staging Plugin

The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to SQL Injection via the 'table_prefix' parameter in version 0.9.68 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Migration Backup Staging

CVE-2024-1981

CRITICAL CVSS 9.8 2024-02-29
Threat Entry Updated 2025-01-28

CVE-2024-1514 - Wp Ecommerce Plugin

The WP eCommerce plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'cart_contents' parameter in all versions up to, and including, 3.15.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Wp Ecommerce

CVE-2024-1514

CRITICAL CVSS 9.8 2024-02-28
Scroll to top