Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,039
Critical0
High3,039
Medium0
Reset
Showing 721-740 of 3039 records
Threat Entry Updated 2025-11-25

CVE-2025-13068 - Telegram Bot Plugin

The Telegram Bot & Channel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Telegram username in all versions up to, and including, 4.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Telegram Bot

CVE-2025-13068

HIGH CVSS 7.2 2025-11-25
Threat Entry Updated 2025-11-25

CVE-2025-12629 - Broken Link Manager Plugin

The Broken Link Manager WordPress plugin through 0.6.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

PLUGIN Broken Link Manager

CVE-2025-12629

HIGH CVSS 7.1 2025-11-24
Threat Entry Updated 2025-11-25

CVE-2024-14015 - Wordpress Ecommerce Plugin

The WordPress eCommerce Plugin WordPress plugin through 2.9.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

PLUGIN Wordpress Ecommerce

CVE-2024-14015

HIGH CVSS 7.1 2025-11-24
Threat Entry Updated 2025-11-25

CVE-2025-7402 - Ads Pro Plugin Multi Purpose Wordpress Advertising Manager

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘site_id’ parameter in all versions up to, and including, 4.95 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ads Pro Plugin Multi Purpose Wordpress Advertising Manager

CVE-2025-7402

HIGH CVSS 7.5 2025-11-24
Threat Entry Updated 2025-11-25

CVE-2025-13526 - Oneclick Chat To Order Plugin

The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL.

PLUGIN Oneclick Chat To Order

CVE-2025-13526

HIGH CVSS 7.5 2025-11-22
Threat Entry Updated 2025-11-25

CVE-2025-13384 - Cp Contact Form With Paypal Plugin

The CP Contact Form with PayPal plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.56. This is due to the plugin exposing an unauthenticated IPN-like endpoint (via the 'cp_contactformpp_ipncheck' query parameter) that processes payment confirmations without any authentication, nonce verification, or PayPal IPN signature validation. This makes it possible for unauthenticated attackers to mark form submissions as paid without making actual payments by sending forged payment notification requests with arbitrary POST data (payment_status, txn_id, payer_email).

PLUGIN Cp Contact Form With Paypal

CVE-2025-13384

HIGH CVSS 7.5 2025-11-22
Threat Entry Updated 2025-11-25

CVE-2025-11087 - Zegen Core Plugin

The Zegen Core plugin for WordPress is vulnerable to Cross-Site Request Forgery to Arbitrary File Upload in versions up to, and including, 2.0.1. This is due to missing nonce validation and missing file type validation in the '/custom-font-code/custom-fonts-uploads.php' file. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Zegen Core

CVE-2025-11087

HIGH CVSS 8.8 2025-11-21
Threat Entry Updated 2025-11-25

CVE-2025-12973 - S2b Ai Assistant Plugin

The S2B AI Assistant – ChatBot, ChatGPT, OpenAI, Content & Image Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the storeFile() function in all versions up to, and including, 1.7.8. This makes it possible for authenticated attackers, with Editor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN S2b Ai Assistant

CVE-2025-12973

HIGH CVSS 7.2 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-13138 - Wp Directory Kit Plugin

The WP Directory Kit plugin for WordPress is vulnerable to SQL Injection via the 'columns_search' parameter of the select_2_ajax() function in all versions up to, and including, 1.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Wp Directory Kit

CVE-2025-13138

HIGH CVSS 7.5 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-12160 - Simple User Registration Plugin

The Simple User Registration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpr_admin_msg' parameter in all versions up to, and including, 6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Simple User Registration

CVE-2025-12160

HIGH CVSS 7.2 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-13156 - For Woocommerce Plugin

The Vitepos – Point of Sale (POS) for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the insert_media_attachment() function in all versions up to, and including, 3.3.0. This is due to the save_update_category_img() function accepting user-supplied file types without validation when processing category images. This makes it possible for authenticated attackers, with subscriber level access and above, to upload arbitrary files on the affected site's server which makes remote code execution possible.

PLUGIN For Woocommerce

CVE-2025-13156

HIGH CVSS 8.8 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-13322 - Wp Audio Gallery Plugin

The WP AUDIO GALLERY plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in all versions up to, and including, 2.0. This is due to the `wpag_uploadaudio_callback()` AJAX handler not properly validating user-supplied file paths in the `audio_upload` parameter before passing them to `unlink()`. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when critical files like wp-config.php are deleted.

PLUGIN Wp Audio Gallery

CVE-2025-13322

HIGH CVSS 8.1 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-13159 - Flo Forms Plugin

The Flo Forms – Easy Drag & Drop Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG file uploads in all versions up to, and including, 1.0.43. This is due to the plugin allowing SVG file uploads via an unauthenticated AJAX endpoint (`flo_form_submit`) without proper file content validation. This makes it possible for unauthenticated attackers to upload malicious SVG files containing JavaScript that executes when an administrator views the uploaded file in the WordPress admin interface, leading to potential full site compromise.

PLUGIN Flo Forms

CVE-2025-13159

HIGH CVSS 7.1 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-12138 - Url Image Importer Plugin

The URL Image Importer plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 1.0.6. This is due to the plugin relying on a user-controlled Content-Type HTTP header to validate file uploads in the 'uimptr_import_image_from_url()' function which writes the file to the server before performing proper validation. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible via the uploaded…

PLUGIN Url Image Importer

CVE-2025-12138

HIGH CVSS 8.8 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-11985 - Realty Portal Plugin

The Realty Portal plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'rp_save_property_settings' function in versions 0.1 to 0.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

PLUGIN Realty Portal

CVE-2025-11985

HIGH CVSS 8.8 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-12135 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'css_code' parameter in all versions up to, and including, 1.0.6 due to a missing capability check on the save_custome_code() function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wpbookit

CVE-2025-12135

HIGH CVSS 7.2 2025-11-21
Threat Entry Updated 2025-11-26

CVE-2025-13206 - Givewp Plugin

The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘name’ parameter in all versions up to, and including, 4.13.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Avatars must be enabled in the WordPress install in order to exploit the vulnerability.

PLUGIN Givewp

CVE-2025-13206

HIGH CVSS 7.2 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-13035 - Code Snippets Plugin

The Code Snippets plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 3.9.1. This is due to the plugin's use of extract() on attacker-controlled shortcode attributes within the `evaluate_shortcode_from_flat_file` method, which can be used to overwrite the `$filepath` variable and subsequently passed to require_once. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute arbitrary PHP code on the server via the `[code_snippet]` shortcode using PHP filter chains granted they can trick an administrator into enabling the "Enable file-based…

PLUGIN Code Snippets

CVE-2025-13035

HIGH CVSS 8.0 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12484 - And Social Followers Plugin

The Giveaways and Contests by RafflePress – Get More Website Traffic, Email Subscribers, and Social Followers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple social media username parameters in all versions up to, and including, 1.12.19 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN And Social Followers

CVE-2025-12484

HIGH CVSS 7.2 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-13145 - For Wordpress Is Vulnerable To Php Object Injection In All Versions Up To Plugin

The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 7.33.1. This is due to deserialization of untrusted data supplied via CSV file imports in the import_single_post_as_csv function within SingleImportExport.php. This makes it possible for authenticated attackers, with administrator-level access or higher, to inject a PHP object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve…

PLUGIN For Wordpress Is Vulnerable To Php Object Injection In All Versions Up To

CVE-2025-13145

HIGH CVSS 7.2 2025-11-19
Scroll to top