Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,046
Critical0
High3,046
Medium0
Reset
Showing 2541-2560 of 3046 records
Threat Entry Updated 2024-11-21

CVE-2023-1912 - Limit Login Attempts Plugin

The Limit Login Attempts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its lock logging feature in versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator accesses the plugin's settings page. This only works when the plugin prioritizes use of the X-FORWARDED-FOR header, which can be configured in its settings.

PLUGIN Limit Login Attempts

CVE-2023-1912

HIGH CVSS 7.2 2023-04-06
Threat Entry Updated 2025-02-14

CVE-2023-1124 - Ecommerce Store Plugin

The Shopping Cart & eCommerce Store WordPress plugin before 5.4.3 does not validate HTTP requests, allowing authenticated users with admin privileges to perform LFI attacks.

PLUGIN Ecommerce Store

CVE-2023-1124

HIGH CVSS 7.2 2023-04-03
Threat Entry Updated 2024-11-21

CVE-2023-1509 - Gmace Plugin

The GMAce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.2. This is due to missing nonce validation on the gmace_manager_server function called via the wp_ajax_gmace_manager AJAX action. This makes it possible for unauthenticated attackers to modify arbitrary files and achieve remote code execution via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Gmace

CVE-2023-1509

HIGH CVSS 8.8 2023-03-29
Threat Entry Updated 2025-02-19

CVE-2023-0955 - Wp Statistics Plugin

The WP Statistics WordPress plugin before 14.0 does not escape a parameter, which could allow authenticated users to perform SQL Injection attacks. By default, the affected feature is available to users with the manage_options capability (admin+), however the plugin has a settings to allow low privilege users to access it as well.

PLUGIN Wp Statistics

CVE-2023-0955

HIGH CVSS 8.8 2023-03-27
Threat Entry Updated 2025-02-19

CVE-2023-0441 - Gallery Blocks With Lightbox Plugin

The Gallery Blocks with Lightbox WordPress plugin before 3.0.8 has an AJAX endpoint that can be accessed by any authenticated users, such as subscriber. The callback function allows numerous actions, the most serious one being reading and updating the WordPress options which could be used to enable registration with a default administrator user role.

PLUGIN Gallery Blocks With Lightbox

CVE-2023-0441

HIGH CVSS 8.1 2023-03-27
Threat Entry Updated 2025-02-25

CVE-2023-28663 - Formidable Pro2pdf Plugin

The Formidable PRO2PDF WordPress Plugin, version < 3.11, is affected by an authenticated SQL injection vulnerability in the ‘fieldmap’ parameter in the fpropdf_export_file action.

PLUGIN Formidable Pro2pdf

CVE-2023-28663

HIGH CVSS 8.8 2023-03-22
Threat Entry Updated 2025-02-26

CVE-2023-0940 - Before 5 Plugin

The ProfileGrid WordPress plugin before 5.3.1 provides an AJAX endpoint for resetting a user password but does not implement proper authorization. This allows a user with low privileges, such as subscriber, to change the password of any account, including Administrator ones.

PLUGIN Before 5

CVE-2023-0940

HIGH CVSS 8.8 2023-03-20
Threat Entry Updated 2025-02-26

CVE-2023-0875 - Before 4 Plugin

The WP Meta SEO WordPress plugin before 4.5.3 does not properly sanitize and escape inputs into SQL queries, leading to a blind SQL Injection vulnerability that can be exploited by subscriber+ users.

PLUGIN Before 4

CVE-2023-0875

HIGH CVSS 8.8 2023-03-20
Threat Entry Updated 2025-02-26

CVE-2023-0865 - Before 21 Plugin

The WooCommerce Multiple Customer Addresses & Shipping WordPress plugin before 21.7 does not ensure that the address to add/update/retrieve/delete and duplicate belong to the user making the request, or is from a high privilege users, allowing any authenticated users, such as subscriber to add/update/duplicate/delete as well as retrieve addresses of other users.

PLUGIN Before 21

CVE-2023-0865

HIGH CVSS 8.8 2023-03-20
Threat Entry Updated 2025-02-26

CVE-2023-0340 - Custom Content Shortcode Plugin

The Custom Content Shortcode WordPress plugin through 4.0.2 does not validate one of its shortcode attribute, which could allow users with a contributor role and above to include arbitrary files via a traversal attack. This could also allow them to read non PHP files and retrieve their content. RCE could also be achieved if the attacker manage to upload a malicious image containing PHP code, and then include it via the affected attribute, on a default WP install, authors could easily achieve that given that they have the upload_file capability.

PLUGIN Custom Content Shortcode

CVE-2023-0340

HIGH CVSS 8.8 2023-03-20
Threat Entry Updated 2024-11-21

CVE-2023-1471 - Wp Popup Banners Plugin

The WP Popup Banners plugin for WordPress is vulnerable to SQL Injection via the 'banner_id' parameter in versions up to, and including, 1.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with minimal permissions, such as a subscrber, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Wp Popup Banners

CVE-2023-1471

HIGH CVSS 8.8 2023-03-17
Threat Entry Updated 2024-11-21

CVE-2023-1172 - Bookly Plugin

The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Bookly

CVE-2023-1172

HIGH CVSS 7.2 2023-03-17
Threat Entry Updated 2024-11-21

CVE-2023-0477 - Before 3 Plugin

The Auto Featured Image (Auto Post Thumbnail) WordPress plugin before 3.9.16 includes an AJAX endpoint that allows any user with at least Author privileges to upload arbitrary files, such as PHP files. This is caused by incorrect file extension validation.

PLUGIN Before 3

CVE-2023-0477

HIGH CVSS 8.8 2023-03-13
Scroll to top