Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,040
Critical0
High3,040
Medium0
Reset
Showing 901-920 of 3040 records
Threat Entry Updated 2025-08-29

CVE-2025-6366 - Event List Plugin

The Event List plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.0.4. This is due to the plugin not properly validating a user's capabilities prior to updating their profile in the el_update_profile() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change their capabilities to those of an administrator.

PLUGIN Event List

CVE-2025-6366

HIGH CVSS 8.8 2025-08-26
Threat Entry Updated 2025-08-26

CVE-2025-5931 - Dokan Pro Plugin

The Dokan Pro plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.5. This is due to the plugin not properly validating a user's identity prior to updating their password during a staff password reset. This makes it possible for authenticated attackers, with vendor-level access and above, to elevate their privilege to the level of a staff member and then change arbitrary user passwords, including those of administrators in order to gain access to their accounts. By default, the plugin allows…

PLUGIN Dokan Pro

CVE-2025-5931

HIGH CVSS 8.8 2025-08-26
Threat Entry Updated 2025-08-26

CVE-2025-9172 - Vibes Plugin

The Vibes plugin for WordPress is vulnerable to time-based SQL Injection via the ‘resource’ parameter in all versions up to, and including, 2.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Vibes

CVE-2025-9172

HIGH CVSS 7.5 2025-08-26
Threat Entry Updated 2025-08-25

CVE-2025-5060 - Bravis User Plugin

The Bravis User plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.0. This is due to the plugin not properly logging a user in with the data that was previously verified through the facebook_ajax_login_callback(). This makes it possible for unauthenticated attackers to log in as administrative users, as long as they have an existing account on the site, and access to the administrative user's email.

PLUGIN Bravis User

CVE-2025-5060

HIGH CVSS 8.1 2025-08-23
Threat Entry Updated 2025-08-25

CVE-2025-7813 - Wp Event Solution Plugin

The Events Calendar, Event Booking, Registrations and Event Tickets – Eventin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 4.0.37 via the proxy_image function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Wp Event Solution

CVE-2025-7813

HIGH CVSS 7.2 2025-08-23
Threat Entry Updated 2025-08-25

CVE-2025-9048 - Wptobe Memberships Plugin

The Wptobe-memberships plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the del_img_ajax_call() function in all versions up to, and including, 3.4.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Wptobe Memberships

CVE-2025-9048

HIGH CVSS 8.1 2025-08-23
Threat Entry Updated 2026-01-16

CVE-2025-8281 - Wp Talroo Plugin

The WP Talroo WordPress plugin through 2.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin and unauthenticated users.

PLUGIN Wp Talroo

CVE-2025-8281

HIGH CVSS 7.1 2025-08-22
Threat Entry Updated 2025-08-22

CVE-2025-8592 - Inspiro Theme

The Inspiro theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.2. This is due to missing or incorrect nonce validation on the inspiro_install_plugin() function. This makes it possible for unauthenticated attackers to install plugins from the repository via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

THEME Inspiro

CVE-2025-8592

HIGH CVSS 8.1 2025-08-21
Threat Entry Updated 2025-08-20

CVE-2025-49382 - Allows Privilege Escalation Theme

Cross-Site Request Forgery (CSRF) vulnerability in DexignZone JobZilla - Job Board WordPress Theme allows Privilege Escalation. This issue affects JobZilla - Job Board WordPress Theme: from n/a through 2.0.

THEME Allows Privilege Escalation

CVE-2025-49382

HIGH CVSS 8.8 2025-08-20
Threat Entry Updated 2025-08-20

CVE-2025-8289 - Wpcf7 Redirect Plugin

The Redirection for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.2.4 via deserialization of untrusted input in the delete_associated_files function. This makes it possible for unauthenticated attackers to inject a PHP Object. This vulnerability may be exploited by unauthenticated attackers when a form is present on the site with a file upload action, and doesn't affect sites with PHP version > 8. This vulnerability also requires the 'Redirection For Contact Form 7 Extension - Create Post' extension to…

PLUGIN Wpcf7 Redirect

CVE-2025-8289

HIGH CVSS 7.5 2025-08-20
Threat Entry Updated 2025-08-20

CVE-2025-8145 - Wpcf7 Redirect Plugin

The Redirection for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.2.4 via deserialization of untrusted input in the get_lead_fields function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in a Contact Form 7 plugin allows attackers to delete arbitrary files. Additionally, in certain server configurations, Remote Code Execution is possible

PLUGIN Wpcf7 Redirect

CVE-2025-8145

HIGH CVSS 8.8 2025-08-20
Threat Entry Updated 2025-08-20

CVE-2025-8141 - Wpcf7 Redirect Plugin

The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_associated_files function in all versions up to, and including, 3.2.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Wpcf7 Redirect

CVE-2025-8141

HIGH CVSS 8.8 2025-08-20
Threat Entry Updated 2025-08-19

CVE-2025-7670 - Jquery Archive List Widget Plugin

The JS Archive List plugin for WordPress is vulnerable to time-based SQL Injection via the build_sql_where() function in all versions up to, and including, 6.1.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Jquery Archive List Widget

CVE-2025-7670

HIGH CVSS 7.5 2025-08-19
Threat Entry Updated 2025-08-19

CVE-2025-7654 - Funnel Builder Plugin

Multiple FunnelKit plugins are vulnerable to Sensitive Information Exposure via the wf_get_cookie shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including authentication cookies of other site users, which may make privilege escalation possible. Please note both FunnelKit – Funnel Builder for WooCommerce Checkout AND FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce are affected by this.

PLUGIN Funnel Builder

CVE-2025-7654

HIGH CVSS 8.8 2025-08-19
Threat Entry Updated 2025-08-19

CVE-2025-8218 - Real Spaces Wordpress Properties Directory Theme

The Real Spaces - WordPress Properties Directory Theme theme for WordPress is vulnerable to privilege escalation via the 'change_role_member' parameter in all versions up to, and including, 3.5. This is due to a lack of restriction in the profile update role. This makes it possible for unauthenticated attackers to arbitrarily choose their role, including the Administrator role, during a profile update.

THEME Real Spaces Wordpress Properties Directory Theme

CVE-2025-8218

HIGH CVSS 8.8 2025-08-19
Threat Entry Updated 2025-08-18

CVE-2025-8142 - Soledad Theme

The Soledad theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 8.6.7 via the 'header_layout' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

THEME Soledad

CVE-2025-8142

HIGH CVSS 8.8 2025-08-16
Threat Entry Updated 2025-08-18

CVE-2025-8105 - The Soledad Theme

The The Soledad theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.6.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

THEME The Soledad

CVE-2025-8105

HIGH CVSS 7.3 2025-08-16
Threat Entry Updated 2025-08-18

CVE-2025-7664 - Al Pack Plugin

The AL Pack plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the check_activate_permission() permission callback for the /wp-json/presslearn/v1/activate REST API endpoint in all versions up to, and including, 1.0.2. The callback reads the client-supplied Origin header and, after parsing, allows the request if it matches one of the trusted domains, without ever verifying user authentication, capabilities, or nonce tokens. This makes it possible for unauthenticated attackers to activate premium features by simply spoofing the Origin header.

PLUGIN Al Pack

CVE-2025-7664

HIGH CVSS 7.5 2025-08-16
Threat Entry Updated 2025-08-18

CVE-2025-6080 - Wpgym Wordpress Gym Management System Plugin

The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to unauthorized admin account creation in all versions up to, and including, 67.7.0. This is due to the plugin not properly validating a user's capabilities prior to adding users. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new users, including admins.

PLUGIN Wpgym Wordpress Gym Management System

CVE-2025-6080

HIGH CVSS 8.8 2025-08-16
Threat Entry Updated 2025-08-18

CVE-2025-6079 - School Management System For Wordpress Plugin

The School Management System for Wordpress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the homework.php file in all versions up to, and including, 93.2.0. This makes it possible for authenticated attackers, with Student-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN School Management System For Wordpress

CVE-2025-6079

HIGH CVSS 8.8 2025-08-16
Scroll to top