Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,040
Critical0
High3,040
Medium0
Reset
Showing 1001-1020 of 3040 records
Threat Entry Updated 2025-07-03

CVE-2024-9017 - Groups Plugin

The PeepSo Core: Groups plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Group Description field in all versions up to, and including, 6.4.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Groups

CVE-2024-9017

HIGH CVSS 7.2 2025-07-03
Threat Entry Updated 2025-07-03

CVE-2025-4946 - Vikinger Theme

The Vikinger theme for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the vikinger_delete_activity_media_ajax() function in all versions up to, and including, 1.9.32. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). Note: Requires Vikinger Media plugin to be installed and active.

THEME Vikinger

CVE-2025-4946

HIGH CVSS 8.1 2025-07-02
Threat Entry Updated 2025-07-07

CVE-2025-6464 - Forminator Plugin

The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.44.2 via deserialization of untrusted input in the 'entry_delete_upload_files' function. This makes it possible for unauthenticated attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is…

PLUGIN Forminator

CVE-2025-6464

HIGH CVSS 7.5 2025-07-02
Threat Entry Updated 2025-07-07

CVE-2025-6463 - Forminator Plugin

The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'entry_delete_upload_files' function in all versions up to, and including, 1.44.2. This makes it possible for unauthenticated attackers to include arbitrary file paths in a form submission. The file will be deleted when the form submission is deleted, whether by an Administrator or via auto-deletion determined by plugin settings. This can easily lead to remote code execution when the right file is…

PLUGIN Forminator

CVE-2025-6463

HIGH CVSS 8.8 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-6459 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.89. This is due to missing or incorrect nonce validation on the bsaCreateAdTemplate function. This makes it possible for unauthenticated attackers to inject and execute arbitrary PHP code via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Ads Pro

CVE-2025-6459

HIGH CVSS 8.8 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-6437 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to SQL Injection via the ‘oid’ parameter in all versions up to, and including, 4.89 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ads Pro

CVE-2025-6437

HIGH CVSS 7.5 2025-07-02
Threat Entry Updated 2025-07-16

CVE-2025-5817 - Amazon Products To Woocommerce Plugin

The Amazon Products to WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.7 via the wcta2w_get_urls(). This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Amazon Products To Woocommerce

CVE-2025-5817

HIGH CVSS 7.2 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-5339 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘bsa_pro_id’ parameter in all versions up to, and including, 4.89 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ads Pro

CVE-2025-5339

HIGH CVSS 7.5 2025-07-02
Threat Entry Updated 2025-07-03

CVE-2025-5014 - Real Estate Wordpress Theme

The Home Villas | Real Estate WordPress Theme theme for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'wp_rem_cs_widget_file_delete' function in all versions up to, and including, 2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

THEME Real Estate Wordpress Theme

CVE-2025-5014

HIGH CVSS 8.8 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-4381 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to SQL Injection via the ‘$id’ variable of the getSpace() function in all versions up to, and including, 4.89 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ads Pro

CVE-2025-4381

HIGH CVSS 7.5 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-4380 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the…

PLUGIN Ads Pro

CVE-2025-4380

HIGH CVSS 8.1 2025-07-02
Threat Entry Updated 2025-07-07

CVE-2025-6755 - Game Users Share Button Plugin

The Game Users Share Buttons plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajaxDeleteTheme() function in all versions up to, and including, 1.3.0. This makes it possible for Subscriber-level attackers to add arbitrary file paths (such as ../../../../wp-config.php) to the themeNameId parameter of the AJAX request, which can lead to remote code execution.

PLUGIN Game Users Share Button

CVE-2025-6755

HIGH CVSS 8.8 2025-06-28
Threat Entry Updated 2025-07-07

CVE-2025-6381 - Vidmov Plugin

The BeeTeam368 Extensions plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_remove_temp_file() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.

PLUGIN Vidmov

CVE-2025-6381

HIGH CVSS 8.8 2025-06-28
Threat Entry Updated 2025-07-07

CVE-2025-6379 - Vidmov Plugin

The BeeTeam368 Extensions Pro plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_live_fn() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.

PLUGIN Vidmov

CVE-2025-6379

HIGH CVSS 8.8 2025-06-28
Threat Entry Updated 2025-06-30

CVE-2025-52811 - Allows Php Local File Inclusion Theme

Path Traversal vulnerability in Creanncy Davenport - Versatile Blog and Magazine WordPress Theme allows PHP Local File Inclusion. This issue affects Davenport - Versatile Blog and Magazine WordPress Theme: from n/a through 1.3.

THEME Allows Php Local File Inclusion

CVE-2025-52811

HIGH CVSS 8.1 2025-06-27
Threat Entry Updated 2025-06-30

CVE-2025-28947 - Allows Php Local File Inclusion Theme

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme MBStore - Digital WooCommerce WordPress Theme allows PHP Local File Inclusion. This issue affects MBStore - Digital WooCommerce WordPress Theme: from n/a through 2.3.

THEME Allows Php Local File Inclusion

CVE-2025-28947

HIGH CVSS 8.1 2025-06-27
Threat Entry Updated 2025-06-30

CVE-2023-25998 - Allows Php Local File Inclusion Theme

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in snstheme Samex - Clean, Minimal Shop WooCommerce WordPress Theme allows PHP Local File Inclusion. This issue affects Samex - Clean, Minimal Shop WooCommerce WordPress Theme: from n/a through 2.6.

THEME Allows Php Local File Inclusion

CVE-2023-25998

HIGH CVSS 8.1 2025-06-27
Threat Entry Updated 2025-07-07

CVE-2025-2940 - Ninja Tables Plugin

The Ninja Tables – Easy Data Table Builder plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 5.0.18 via the args[url] parameter. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Ninja Tables

CVE-2025-2940

HIGH CVSS 7.2 2025-06-27
Threat Entry Updated 2025-07-08

CVE-2025-6212 - Ultimate Addons For Contact Form 7 Plugin

The Ultra Addons for Contact Form 7 plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Database module in versions 3.5.11 to 3.5.19 due to insufficient input sanitization and output escaping. The unfiltered field names are stored alongside the sanitized values. Later, the admin-side AJAX endpoint ajax_get_table_data() returns those raw names as JSON column headers, and the client-side DataTables renderer injects them directly into the DOM without any HTML encoding. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever…

PLUGIN Ultimate Addons For Contact Form 7

CVE-2025-6212

HIGH CVSS 7.2 2025-06-26
Threat Entry Updated 2025-06-26

CVE-2025-5590 - Responsive Owl Carousel Plugin

The Owl carousel responsive plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Responsive Owl Carousel

CVE-2025-5590

HIGH CVSS 8.8 2025-06-26
Scroll to top