Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,046
Critical0
High3,046
Medium0
Reset
Showing 2501-2520 of 3046 records
Threat Entry Updated 2026-04-08

CVE-2021-4350 - Frontend File Manager Plugin

The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated HTML Injection in versions up to, and including, 18.2. This is due to lacking authentication protections on the wpfm_send_file_in_email AJAX action. This makes it possible for unauthenticated attackers to send emails using the site with a custom subject, recipient email, and body with unsanitized HTML content. This effectively lets the attacker use the site as a spam relay.

PLUGIN Frontend File Manager

CVE-2021-4350

HIGH CVSS 7.2 2023-06-07
Threat Entry Updated 2024-11-21

CVE-2023-2833 - Reviewx Plugin

The ReviewX plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.6.13 due to insufficient restriction on the 'rx_set_screen_options' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wp_screen_options[option]' and 'wp_screen_options[value]' parameters during a screen option update.

PLUGIN Reviewx

CVE-2023-2833

HIGH CVSS 8.8 2023-06-06
Threat Entry Updated 2024-11-21

CVE-2023-2546 - Wp User Switch Plugin

The WP User Switch plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.0.2. This is due to incorrect authentication checking in the 'wpus_allow_user_to_admin_bar_menu' function with the 'wpus_who_switch' cookie value. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to log in as any existing user on the site, such as an administrator, if they have access to the username.

PLUGIN Wp User Switch

CVE-2023-2546

HIGH CVSS 8.8 2023-06-06
Threat Entry Updated 2025-01-08

CVE-2023-0900 - Pricing Table Builder Plugin

The Pricing Table Builder WordPress plugin through 1.1.6 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high-privilege users such as admins.

PLUGIN Pricing Table Builder

CVE-2023-0900

HIGH CVSS 7.2 2023-06-05
Threat Entry Updated 2025-06-10

CVE-2023-2298 - Online Booking Scheduling Calendar Plugin

The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'business_id' parameter in versions up to, and including, 4.2.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Online Booking Scheduling Calendar

CVE-2023-2298

HIGH CVSS 7.2 2023-06-03
Threat Entry Updated 2024-11-21

CVE-2023-2781 - User Email Verification For Woocommerce Plugin

The User Email Verification for WooCommerce plugin for WordPress is vulnerable to authentication bypass via authenticate_user_by_email in versions up to, and including, 3.5.0. This is due to a random token generation weakness in the resend_verification_email function. This allows unauthenticated attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Allow Automatic Login After Successful Verification setting to be enabled, which it is not by default.

PLUGIN User Email Verification For Woocommerce

CVE-2023-2781

HIGH CVSS 8.1 2023-06-03
Threat Entry Updated 2024-11-21

CVE-2023-2201 - Web Directory Free Plugin

The Web Directory Free for WordPress is vulnerable to SQL Injection via the ‘post_id’ parameter in versions up to, and including, 1.6.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Web Directory Free

CVE-2023-2201

HIGH CVSS 8.8 2023-06-02
Threat Entry Updated 2024-11-21

CVE-2023-2549 - Feather Login Page Plugin

The Feather Login Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions starting from 1.0.7 up to, and including, 1.1.1. This is due to missing nonce validation in the 'createTempAccountLink' function. This makes it possible for unauthenticated attackers to create a new user with administrator role via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can leverage CVE-2023-2545 to get the login link or request a password reset to the new user's email…

PLUGIN Feather Login Page

CVE-2023-2549

HIGH CVSS 8.8 2023-05-31
Threat Entry Updated 2024-11-21

CVE-2023-2545 - Feather Login Page Plugin

The Feather Login Page plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'getListOfUsers' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to access the login links, which can be used for privilege escalation.

PLUGIN Feather Login Page

CVE-2023-2545

HIGH CVSS 8.1 2023-05-31
Threat Entry Updated 2024-11-21

CVE-2023-2435 - Blog In Blog Plugin

The Blog-in-Blog plugin for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 1.1.1 via a shortcode attribute. This allows editor-level, and above, attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

PLUGIN Blog In Blog

CVE-2023-2435

HIGH CVSS 7.2 2023-05-31
Threat Entry Updated 2025-01-10

CVE-2023-2288 - Before 2 Plugin

The Otter WordPress plugin before 2.2.6 does not sanitize some user-controlled file paths before performing file operations on them. This leads to a PHAR deserialization vulnerability on PHP < 8.0 using the phar:// stream wrapper.

PLUGIN Before 2

CVE-2023-2288

HIGH CVSS 8.8 2023-05-30
Threat Entry Updated 2025-01-10

CVE-2023-1938 - Wp Fastest Cache Plugin

The WP Fastest Cache WordPress plugin before 1.1.5 does not have CSRF check in an AJAX action, and does not validate user input before using it in the wp_remote_get() function, leading to a Blind SSRF issue

PLUGIN Wp Fastest Cache

CVE-2023-1938

HIGH CVSS 8.8 2023-05-30
Threat Entry Updated 2025-01-10

CVE-2023-0766 - Newsletter Popup Plugin

The Newsletter Popup WordPress plugin through 1.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks as the wp_newsletter_show_localrecord page is not protected with a nonce.

PLUGIN Newsletter Popup

CVE-2023-0766

HIGH CVSS 8.8 2023-05-30
Threat Entry Updated 2025-04-23

CVE-2023-0329 - Elementor Website Builder Plugin

The Elementor Website Builder WordPress plugin before 3.12.2 does not properly sanitize and escape the Replace URL parameter in the Tools module before using it in a SQL statement, leading to a SQL injection exploitable by users with the Administrator role.

PLUGIN Elementor Website Builder

CVE-2023-0329

HIGH CVSS 7.2 2023-05-30
Threat Entry Updated 2024-11-21

CVE-2023-2500 - Go Pricing Plugin

The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 3.3.19 via deserialization of untrusted input from the 'go_pricing' shortcode 'data' parameter. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

PLUGIN Go Pricing

CVE-2023-2500

HIGH CVSS 8.8 2023-05-25
Threat Entry Updated 2024-11-21

CVE-2023-2496 - Go Pricing Plugin

The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to unauthorized arbitrary file uploads due to an improper capability check on the 'validate_upload' function in versions up to, and including, 3.3.19. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Go Pricing

CVE-2023-2496

HIGH CVSS 7.1 2023-05-24
Threat Entry Updated 2024-11-21

CVE-2023-2736 - Groundhogg Plugin

The Groundhogg plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.7.9.8. This is due to missing nonce validation in the 'ajax_edit_contact' function. This makes it possible for authenticated attackers to receive the auto login link via shortcode and then modify the assigned user to the auto login link to elevate verified user privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Groundhogg

CVE-2023-2736

HIGH CVSS 7.5 2023-05-20
Threat Entry Updated 2024-11-21

CVE-2023-2757 - Waiting Plugin

The Waiting: One-click countdowns plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on 'saveLang' functions in versions up to, and including, 0.6.2. This could lead to Cross-Site Scripting due to insufficient input sanitization and output escaping. This makes it possible for subscriber-level attackers to access functions to save plugin data that can potentially lead to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Waiting

CVE-2023-2757

HIGH CVSS 7.4 2023-05-18
Threat Entry Updated 2024-11-21

CVE-2023-2706 - Otp Login Woocommerce Gravity Forms Plugin

The OTP Login Woocommerce & Gravity Forms plugin for WordPress is vulnerable to authentication bypass. This is due to the fact that when generating OTP codes for users to use in order to login via phone number, the plugin returns these codes in an AJAX response. This makes it possible for unauthenticated attackers to obtain login codes for administrators. This does require an attacker have access to the phone number configured for an account, which can be obtained via social engineering or reconnaissance.

PLUGIN Otp Login Woocommerce Gravity Forms

CVE-2023-2706

HIGH CVSS 8.1 2023-05-17
Threat Entry Updated 2025-01-24

CVE-2023-2180 - Kiwiz Invoices Certification Pdf System Plugin

The KIWIZ Invoices Certification & PDF System WordPress plugin through 2.1.3 does not validate the path of files to be downloaded, which could allow unauthenticated attacker to read/downlaod arbitrary files, as well as perform PHAR unserialization (assuming they can upload a file on the server)

PLUGIN Kiwiz Invoices Certification Pdf System

CVE-2023-2180

HIGH CVSS 7.5 2023-05-15
Scroll to top