Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,040
Critical0
High3,040
Medium0
Reset
Showing 961-980 of 3040 records
Threat Entry Updated 2025-07-22

CVE-2025-6585 - Wp Jobhunt Plugin

The WP JobHunt plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.2 via the cs_remove_profile_callback() function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete accounts of other users including admins.

PLUGIN Wp Jobhunt

CVE-2025-6585

HIGH CVSS 8.1 2025-07-22
Threat Entry Updated 2025-07-22

CVE-2025-7438 - Masterstudy Lms Pro Plugin

The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'install_and_activate_plugin' function in all versions up to, and including, 4.7.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The vulnerability is difficult to exploit due to timing requirements and environmental factors.

PLUGIN Masterstudy Lms Pro

CVE-2025-7438

HIGH CVSS 7.5 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-6718 - B1 Accounting Plugin

The B1.lt plugin for WordPress is vulnerable to SQL Injection due to a missing capability check on the b1_run_query AJAX action in all versions up to, and including, 2.2.56. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute and run arbitrary SQL commands.

PLUGIN B1 Accounting

CVE-2025-6718

HIGH CVSS 8.8 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-6813 - Aapanel Wp Toolkit Plugin

The aapanel WP Toolkit plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization checks within the auto_login() function in versions 1.0 to 1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to bypass all role checks and gain full admin privileges.

PLUGIN Aapanel Wp Toolkit

CVE-2025-6813

HIGH CVSS 8.8 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-3740 - For Wordpress Is Vulnerable To Local File Inclusion In All Versions Up To Plugin

The School Management System for Wordpress plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 93.1.0 via the 'page' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The Local File…

PLUGIN For Wordpress Is Vulnerable To Local File Inclusion In All Versions Up To

CVE-2025-3740

HIGH CVSS 8.8 2025-07-18
Threat Entry Updated 2025-07-16

CVE-2025-31422 - Allows Object Injection Theme

Deserialization of Untrusted Data vulnerability in designthemes Visual Art | Gallery WordPress Theme allows Object Injection. This issue affects Visual Art | Gallery WordPress Theme: from n/a through 2.4.

THEME Allows Object Injection

CVE-2025-31422

HIGH CVSS 8.8 2025-07-16
Threat Entry Updated 2025-07-16

CVE-2025-47554 - WordPress Core

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuanticaLabs CSS3 Compare Pricing Tables for WordPress allows Reflected XSS. This issue affects CSS3 Compare Pricing Tables for WordPress: from n/a through 11.6.

CORE WordPress Core

CVE-2025-47554

HIGH CVSS 7.1 2025-07-16
Threat Entry Updated 2025-07-16

CVE-2025-46500 - WordPress Core

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ValvePress Wordpress Auto Spinner allows Reflected XSS. This issue affects Wordpress Auto Spinner: from n/a through 3.25.0.

CORE WordPress Core

CVE-2025-46500

HIGH CVSS 7.1 2025-07-16
Threat Entry Updated 2025-07-16

CVE-2025-31427 - WordPress Core

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in designthemes Invico - WordPress Consulting Business Theme allows Reflected XSS. This issue affects Invico - WordPress Consulting Business Theme: from n/a through 1.9.

CORE WordPress Core

CVE-2025-31427

HIGH CVSS 7.1 2025-07-16
Threat Entry Updated 2025-07-16

CVE-2025-31072 - WordPress Core

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in designthemes Ofiz - WordPress Business Consulting Theme allows Reflected XSS. This issue affects Ofiz - WordPress Business Consulting Theme: from n/a through 2.0.

CORE WordPress Core

CVE-2025-31072

HIGH CVSS 7.1 2025-07-16
Threat Entry Updated 2025-07-16

CVE-2025-31055 - WordPress Core

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vergatheme Electrician - Electrical Service WordPress allows Reflected XSS. This issue affects Electrician - Electrical Service WordPress: from n/a through 1.0.

CORE WordPress Core

CVE-2025-31055

HIGH CVSS 7.1 2025-07-16
Threat Entry Updated 2025-07-16

CVE-2025-28955 - WooCommerce Plugin

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in FWDesign Easy Video Player Wordpress & WooCommerce allows Path Traversal. This issue affects Easy Video Player Wordpress & WooCommerce: from n/a through 10.0.

PLUGIN WooCommerce

CVE-2025-28955

HIGH CVSS 7.5 2025-07-16
Threat Entry Updated 2025-08-02

CVE-2025-6993 - Ultimate Wp Mail Plugin

The Ultimate WP Mail plugin for WordPress is vulnerable to Privilege Escalation due to improper authorization within the get_email_log_details() AJAX handler in versions 1.0.17 to 1.3.6. The handler reads the client-supplied post_id and retrieves the corresponding email log post content (including the password-reset link), relying only on the ‘edit_posts’ capability without restricting to administrators or validating ownership. This makes it possible for authenticated attackers, with Contributor-level access and above, to harvest an admin’s reset link and elevate their privileges to administrator.

PLUGIN Ultimate Wp Mail

CVE-2025-6993

HIGH CVSS 7.5 2025-07-16
Threat Entry Updated 2025-07-16

CVE-2025-7359 - Counter Visitor For Woocommerce Plugin

The Counter live visitors for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wcvisitor_get_block function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to delete arbitrary files on the server. NOTE: This particular vulnerability deletes all the files in a targeted arbitrary directory rather than a specified arbitrary file, which can lead to loss of data or a denial of service condition.

PLUGIN Counter Visitor For Woocommerce

CVE-2025-7359

HIGH CVSS 8.2 2025-07-16
Threat Entry Updated 2025-07-16

CVE-2025-6043 - Wp Malware Removal Plugin

The Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin for WordPress is vulnerable to Arbitrary File Deletion due to a missing capability check on the wpmr_delete_file() function in all versions up to, and including, 16.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files making remote code execution possible. This is only exploitable when advanced mode is enabled on the site.

PLUGIN Wp Malware Removal

CVE-2025-6043

HIGH CVSS 8.1 2025-07-16
Threat Entry Updated 2025-07-16

CVE-2025-2800 - Wp Event Manager Plugin

The WP Event Manager – Events Calendar, Registrations, Sell Tickets with WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘organizer_name' parameter in all versions up to, and including, 3.1.50 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wp Event Manager

CVE-2025-2800

HIGH CVSS 7.2 2025-07-16
Threat Entry Updated 2025-07-15

CVE-2025-7667 - Restrict File Access Plugin

The Restrict File Access plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the 'restrict-file-access' page. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php), via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Restrict File Access

CVE-2025-7667

HIGH CVSS 8.1 2025-07-15
Threat Entry Updated 2025-08-02

CVE-2025-7504 - Friends Plugin

The Friends plugin for WordPress is vulnerable to PHP Object Injection in version 3.5.1 via deserialization of untrusted input of the query_vars parameter This makes it possible for authenticated attackers, with subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may…

PLUGIN Friends

CVE-2025-7504

HIGH CVSS 7.5 2025-07-12
Threat Entry Updated 2025-07-15

CVE-2025-6423 - Beeteam368 Extensions Plugin

The BeeTeam368 Extensions plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the handle_submit_upload_file() function in all versions up to, and including, 2.3.5. This makes it possible for authenticated attackers with Subscriber-level access or higher to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Beeteam368 Extensions

CVE-2025-6423

HIGH CVSS 8.8 2025-07-12
Threat Entry Updated 2025-07-15

CVE-2025-1313 - Nokri Job Board Wordpress Theme

The Nokri - Job Board WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.6.3. This is due to the plugin not properly validating a user's identity prior to updating their details like email address. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

THEME Nokri Job Board Wordpress Theme

CVE-2025-1313

HIGH CVSS 8.8 2025-07-12
Scroll to top