Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,040
Critical0
High3,040
Medium0
Reset
Showing 941-960 of 3040 records
Threat Entry Updated 2025-08-04

CVE-2025-7443 - And Javascript Plugin

The BerqWP – Automated All-In-One Page Speed Optimization for Core Web Vitals, Cache, CDN, Images, CSS, and JavaScript plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the store_javascript_cache.php file in all versions up to, and including, 2.2.42. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN And Javascript

CVE-2025-7443

HIGH CVSS 8.1 2025-08-01
Threat Entry Updated 2025-08-04

CVE-2025-7725 - Openai Plugin

The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons, OpenAI plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the comment feature in all versions up to, and including, 26.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Openai

CVE-2025-7725

HIGH CVSS 7.2 2025-08-01
Threat Entry Updated 2025-07-31

CVE-2025-8213 - Malware Scan Plugin

The NinjaScanner – Virus & Malware scan plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'nscan_ajax_quarantine' and 'nscan_quarantine_select' functions in all versions up to, and including, 3.2.5. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, including files outside the WordPress root directory.

PLUGIN Malware Scan

CVE-2025-8213

HIGH CVSS 7.2 2025-07-31
Threat Entry Updated 2025-07-31

CVE-2025-7847 - Ai Engine Plugin

The AI Engine plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the rest_simpleFileUpload() function in versions 2.9.3 and 2.9.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server when the REST API is enabled, which may make remote code execution possible.

PLUGIN Ai Engine

CVE-2025-7847

HIGH CVSS 8.8 2025-07-31
Threat Entry Updated 2025-07-29

CVE-2025-7689 - Hydra Booking Plugin

The Hydra Booking plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the tfhb_reset_password_callback() function in versions 1.1.0 to 1.1.18. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the password of an Administrator user, achieving full privilege escalation.

PLUGIN Hydra Booking

CVE-2025-7689

HIGH CVSS 8.8 2025-07-29
Threat Entry Updated 2025-07-29

CVE-2025-6495 - Bricks Theme

The Bricks theme for WordPress is vulnerable to blind SQL Injection via the ‘p’ parameter in all versions up to, and including, 1.12.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

THEME Bricks

CVE-2025-6495

HIGH CVSS 7.5 2025-07-29
Threat Entry Updated 2025-07-29

CVE-2025-6989 - Kallyas Theme

The Kallyas theme for WordPress is vulnerable to arbitrary folder deletion due to insufficient file path validation in the delete_font() function in all versions up to, and including, 4.21.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary folders on the server.

THEME Kallyas

CVE-2025-6989

HIGH CVSS 8.1 2025-07-26
Threat Entry Updated 2025-07-29

CVE-2025-6991 - Kallyas Theme

The kallyas theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.21.0 via the 'TH_LatestPosts4` widget. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

THEME Kallyas

CVE-2025-6991

HIGH CVSS 7.5 2025-07-26
Threat Entry Updated 2025-07-29

CVE-2025-8198 - High Converting Ecommerce Wordpress Theme

The MinimogWP – The High Converting eCommerce WordPress Theme theme for WordPress is vulnerable to price manipulation in all versions up to, and including, 3.9.0. This is due to an insufficient check on quantity values when changing quantities in the cart. This makes it possible for unauthenticated attackers to add items to the cart and adjust the quantity to a fractional amount, causing the price to change based on the fractional amount. The vulnerability cannot be exploited if WooCommerce version 9.8.2+ is installed.

THEME High Converting Ecommerce Wordpress Theme

CVE-2025-8198

HIGH CVSS 7.5 2025-07-26
Threat Entry Updated 2025-07-29

CVE-2024-13507 - Geodirectory Plugin

The GeoDirectory – WP Business Directory Plugin and Classified Listings Directory plugin for WordPress is vulnerable to time-based SQL Injection via the dist parameter in all versions up to, and including, 2.8.97 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Geodirectory

CVE-2024-13507

HIGH CVSS 7.5 2025-07-26
Threat Entry Updated 2025-07-25

CVE-2023-7306 - Frontend File Manager Plugin

The Frontend File Manager Plugin plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the wpfm_delete_multiple_files() function in all versions up to, and including, 21.5. This makes it possible for unauthenticated attackers to delete arbitrary posts.

PLUGIN Frontend File Manager Plugin

CVE-2023-7306

HIGH CVSS 7.5 2025-07-25
Threat Entry Updated 2025-07-28

CVE-2025-5835 - Droip Plugin

The Droip plugin for WordPress is vulnerable to unauthorized modification and access of data due to a missing capability check on the droip_post_apis() function in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform many actions as the AJAX hooks to several functions. Some potential impacts include arbitrary post deletion, arbitrary post creation, post duplication, settings update, user manipulation, and much more.

PLUGIN Droip

CVE-2025-5835

HIGH CVSS 8.8 2025-07-25
Threat Entry Updated 2025-07-28

CVE-2025-5831 - Droip Plugin

The Droip plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the make_google_font_offline() function in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Droip

CVE-2025-5831

HIGH CVSS 8.8 2025-07-25
Threat Entry Updated 2025-07-25

CVE-2025-7695 - Integration Cds Plugin

The Dataverse Integration plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization checks within its reset_password_link REST endpoint in versions 2.77 through 2.81. The endpoint’s handler accepts a client-supplied id, email, or login, looks up that user, and calls get_password_reset_key() unconditionally. Because it only checks that the caller is authenticated, and not that they own or may edit the target account, any authenticated attacker, with Subscriber-level access and above, can obtain a password reset link for an administrator and hijack that account.

PLUGIN Integration Cds

CVE-2025-7695

HIGH CVSS 8.8 2025-07-24
Threat Entry Updated 2025-07-25

CVE-2025-7640 - Hiweb Export Posts Plugin

The hiWeb Export Posts plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.9.0.0. This is due to missing or incorrect nonce validation on the tool-dashboard-history.php file. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Hiweb Export Posts

CVE-2025-7640

HIGH CVSS 8.1 2025-07-24
Threat Entry Updated 2025-07-25

CVE-2025-7722 - Social Streams Plugin

The Social Streams plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.0.1. This is due to the plugin not properly validating a user's identity prior to updating their user meta information in the update_user_meta() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change their user type to that of an administrator.

PLUGIN Social Streams

CVE-2025-7722

HIGH CVSS 8.8 2025-07-23
Threat Entry Updated 2025-07-25

CVE-2025-6190 - Realty Portal Agent Plugin

The Realty Portal – Agent plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within the rp_user_profile() AJAX handler in versions 0.1.0 through 0.3.9. The handler reads the client-supplied meta key and value pairs from $_POST and passes them directly to update_user_meta() without restricting to a safe whitelist. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the wp_capabilities meta and grant themselves the administrator role.

PLUGIN Realty Portal Agent

CVE-2025-6190

HIGH CVSS 8.8 2025-07-23
Threat Entry Updated 2025-07-22

CVE-2025-7692 - Orion Login With Sms Plugin

The Orion Login with SMS plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.5. This is due to the olws_handle_verify_phone() function not utilizing a strong enough OTP value, exposing the hash needed to generate the OTP value, and no restrictions on the number of attempts to submit the code. This makes it possible for unauthenticated attackers to log in as other users, including administrators, if they have access to their phone number.

PLUGIN Orion Login With Sms

CVE-2025-7692

HIGH CVSS 8.1 2025-07-22
Threat Entry Updated 2025-08-01

CVE-2025-6213 - Fastcgi Cache Purge And Preload Nginx Plugin

The Nginx Cache Purge Preload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.1.1 via the 'nppp_preload_cache_on_update' function. This is due to insufficient sanitization of the $_SERVER['HTTP_REFERERER'] parameter passed from the 'nppp_handle_fastcgi_cache_actions_admin_bar' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.

PLUGIN Fastcgi Cache Purge And Preload Nginx

CVE-2025-6213

HIGH CVSS 7.2 2025-07-22
Threat Entry Updated 2025-07-22

CVE-2025-7645 - Extensions For Cf7 Plugin

The Extensions For CF7 (Contact form 7 Database, Conditional Fields and Redirection) plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'delete-file' field in all versions up to, and including, 3.2.8. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, when an administrator deletes the submission, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Extensions For Cf7

CVE-2025-7645

HIGH CVSS 8.1 2025-07-22
Scroll to top