Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,023
Critical0
High3,023
Medium0
Reset
Showing 41-60 of 3023 records
Threat Entry Updated 2026-03-30

CVE-2026-2511 - JS Help Desk – AI-Powered Support & Ticketing System Plugin

The JS Help Desk – AI-Powered Support & Ticketing System plugin for WordPress is vulnerable to SQL Injection via the `multiformid` parameter in the `storeTickets()` function in all versions up to, and including, 3.0.4. This is due to the user-supplied `multiformid` value being passed to `esc_sql()` without enclosing the result in quotes in the SQL query, rendering the escaping ineffective against payloads that do not contain quote characters. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract…

PLUGIN JS Help Desk – AI-Powered Support & Ticketing System

CVE-2026-2511

HIGH CVSS 7.5 2026-03-26
Threat Entry Updated 2026-03-30

CVE-2026-2231 - Fluent Booking Plugin

The Fluent Booking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in all versions up to, and including, 2.0.01 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Fluent Booking

CVE-2026-2231

HIGH CVSS 7.2 2026-03-26
Threat Entry Updated 2026-03-30

CVE-2026-4329 - Blackhole Bad Bots Plugin

The Blackhole for Bad Bots plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the User-Agent HTTP header in all versions up to and including 3.8. This is due to insufficient input sanitization and output escaping. The plugin uses sanitize_text_field() when capturing bot data (which strips HTML tags but does not escape HTML entities like double quotes), then stores the data via update_option(). When an administrator views the Bad Bots log page, the stored data is output directly into HTML input value attributes (lines 75-83) without esc_attr() and into…

PLUGIN Blackhole Bad Bots

CVE-2026-4329

HIGH CVSS 7.2 2026-03-26
Threat Entry Updated 2026-03-30

CVE-2026-2931 - Amelia Booking Plugin

The Amelia Booking plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 9.1.2. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resources. This makes it possible for authenticated attackers with customer-level permissions or above to change user passwords and potentially take over administrator accounts. The vulnerability is in the pro plugin, which has the same slug.

PLUGIN Amelia Booking

CVE-2026-2931

HIGH CVSS 8.8 2026-03-26
Threat Entry Updated 2026-03-30

CVE-2026-3328 - Acf Frontend Form Element Plugin

The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to PHP Object Injection via deserialization of the 'post_content' of admin_form posts in all versions up to, and including, 3.28.31. This is due to the use of WordPress's `maybe_unserialize()` function without class restrictions on user-controllable content stored in admin_form post content. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to achieve remote code execution.

PLUGIN Acf Frontend Form Element

CVE-2026-3328

HIGH CVSS 7.2 2026-03-26
Threat Entry Updated 2026-03-30

CVE-2026-4758 - Wp Job Portal Plugin

The WP Job Portal plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'WPJOBPORTALcustomfields::removeFileCustom' function in all versions up to, and including, 2.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Wp Job Portal

CVE-2026-4758

HIGH CVSS 8.8 2026-03-26
Threat Entry Updated 2026-03-30

CVE-2026-25334 - Salon Booking System Pro Plugin

Incorrect Privilege Assignment vulnerability in wordpresschef Salon Booking System Pro salon-booking-plugin-pro allows Privilege Escalation.This issue affects Salon Booking System Pro: from n/a through < 10.30.12.

PLUGIN Salon Booking System Pro

CVE-2026-25334

HIGH CVSS 8.1 2026-03-25
Threat Entry Updated 2026-03-30

CVE-2026-23806 - WordPress Core

Missing Authorization vulnerability in BlueGlass Interactive AG Jobs for WordPress job-postings allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Jobs for WordPress: from n/a through

CORE WordPress Core

CVE-2026-23806

HIGH CVSS 7.5 2026-03-25
Threat Entry Updated 2026-03-30

CVE-2026-22523 - Ultra WordPress Admin Theme

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themepassion Ultra WordPress Admin ultra-admin allows Reflected XSS.This issue affects Ultra WordPress Admin: from n/a through

THEME Ultra WordPress Admin

CVE-2026-22523

HIGH CVSS 7.1 2026-03-25
Threat Entry Updated 2026-03-24

CVE-2026-4662 - Jet Engine Plugin

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validation (allowing attacker-controlled input to bypass security checks) combined with the `prepare_where_clause()` method in the SQL Query Builder not sanitizing the `compare` operator before concatenating it into SQL statements. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from…

PLUGIN Jet Engine

CVE-2026-4662

HIGH CVSS 7.5 2026-03-24
Threat Entry Updated 2026-03-24

CVE-2026-4021 - Contest Gallery Plugin

The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28.1.5. This is due to the email confirmation handler in `users-registry-check-after-email-or-pin-confirmation.php` using the user's email string in a `WHERE ID = %s` clause instead of the numeric user ID, combined with an unauthenticated key-based login endpoint in `ajax-functions-frontend.php`. When the non-default `RegMailOptional=1` setting is enabled, an attacker can register with a crafted email starting with the target user ID (e.g., `1poc@example.test`), trigger the confirmation flow to…

PLUGIN Contest Gallery

CVE-2026-4021

HIGH CVSS 8.1 2026-03-24
Threat Entry Updated 2026-03-24

CVE-2026-3533 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and including, 4.14.1. This makes it possible for Authenticated attackers with Subscriber-level access and above, to upload files with dangerous types that can lead to Remote Code Execution on servers configured to handle .phar files as executable PHP (e.g., Apache+mod_php), or Stored Cross-Site Scripting via .svg, .dfxp, or .xhtml files upload on any server…

PLUGIN Jupiter X Core

CVE-2026-3533

HIGH CVSS 8.8 2026-03-24
Threat Entry Updated 2026-03-24

CVE-2026-4306 - Wp Job Portal Plugin

The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter in all versions up to, and including, 2.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Wp Job Portal

CVE-2026-4306

HIGH CVSS 7.5 2026-03-23
Threat Entry Updated 2026-03-23

CVE-2026-2580 - Wp Google Map Plugin

The WP Maps – Store Locator,Google Maps,OpenStreetMap,Mapbox,Listing,Directory & Filters plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby’ parameter in all versions up to, and including, 4.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Wp Google Map

CVE-2026-2580

HIGH CVSS 7.5 2026-03-23
Threat Entry Updated 2026-03-23

CVE-2026-4314 - The Ultimate WordPress Toolkit – WP Extended Plugin

The 'The Ultimate WordPress Toolkit – WP Extended' plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.2.4. This is due to the `isDashboardOrProfileRequest()` method in the Menu Editor module using an insecure `strpos()` check against `$_SERVER['REQUEST_URI']` to determine if a request targets the dashboard or profile page. The `grantVirtualCaps()` method, which is hooked into the `user_has_cap` filter, grants elevated capabilities including `manage_options` when this check returns true. This makes it possible for authenticated attackers, with Subscriber-level access and above, to gain administrative capabilities…

PLUGIN The Ultimate WordPress Toolkit – WP Extended

CVE-2026-4314

HIGH CVSS 8.8 2026-03-22
Threat Entry Updated 2026-03-23

CVE-2026-3629 - Import And Export Users And Customers Plugin

The Import and export users and customers plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.29.7. This is due to the 'save_extra_user_profile_fields' function not properly restricting which user meta keys can be updated via profile fields. The 'get_restricted_fields' method does not include sensitive meta keys such as 'wp_capabilities'. This makes it possible for unauthenticated attackers to escalate their privileges to Administrator by submitting a crafted registration request that sets the 'wp_capabilities' meta key. The vulnerability can only be exploited if the "Show fields…

PLUGIN Import And Export Users And Customers

CVE-2026-3629

HIGH CVSS 8.1 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-4373 - JetFormBuilder — Dynamic Blocks Form Builder Plugin

The JetFormBuilder plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 3.5.6.2. This is due to the 'Uploaded_File::set_from_array' method accepting user-supplied file paths from the Media Field preset JSON payload without validating that the path belongs to the WordPress uploads directory. Combined with an insufficient same-file check in 'File_Tools::is_same_file' that only compares basenames, this makes it possible for unauthenticated attackers to exfiltrate arbitrary local files as email attachments by submitting a crafted form request when the form is configured with…

PLUGIN JetFormBuilder — Dynamic Blocks Form Builder

CVE-2026-4373

HIGH CVSS 7.5 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-4261 - Expire Users Plugin

The Expire Users plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.2. This is due to the plugin allowing a user to update the 'on_expire_default_to_role' meta through the 'save_extra_user_profile_fields' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator.

PLUGIN Expire Users

CVE-2026-4261

HIGH CVSS 8.8 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-3478 - Content Syndication Toolkit Plugin

The Content Syndication Toolkit plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3 via the redux_p AJAX action in the bundled ReduxFramework library. The plugin registers a proxy endpoint (wp_ajax_nopriv_redux_p) that is accessible to unauthenticated users. The proxy() method in the Redux_P class takes a URL directly from $_GET['url'] without any validation (the regex is set to /.*/ which matches all URLs) and passes it to wp_remote_request(), which does not have built-in SSRF protection like wp_safe_remote_request(). There is no authentication check, no…

PLUGIN Content Syndication Toolkit

CVE-2026-3478

HIGH CVSS 7.2 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-3334 - Cms Commander Client Plugin

The CMS Commander plugin for WordPress is vulnerable to SQL Injection via the 'or_blogname', 'or_blogdescription', and 'or_admin_email' parameters in all versions up to, and including, 2.288. This is due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL queries in the restore workflow. This makes it possible for authenticated attackers, with CMS Commander API key access, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Cms Commander Client

CVE-2026-3334

HIGH CVSS 8.8 2026-03-21
Scroll to top