Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,044
Critical0
High3,044
Medium0
Reset
Showing 1621-1640 of 3044 records
Threat Entry Updated 2024-11-23

CVE-2024-10803 - Mp3 Sticky Player Plugin

The MP3 Sticky Player plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 8.0 via the content/downloader.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. Please note the vendor released the patched version as the same version as the affected version.

PLUGIN Mp3 Sticky Player

CVE-2024-10803

HIGH CVSS 7.5 2024-11-23
Threat Entry Updated 2025-07-12

CVE-2024-10873 - Element Kit For Elementor Plugin

The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.4.2 via the _load_template function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

PLUGIN Element Kit For Elementor

CVE-2024-10873

HIGH CVSS 8.8 2024-11-23
Threat Entry Updated 2024-11-23

CVE-2024-11415 - Wp Orphanage Extended Plugin

The WP-Orphanage Extended plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation on the wporphanageex_menu_settings() function. This makes it possible for unauthenticated attackers to escalate the privileges of all orphan accounts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Wp Orphanage Extended

CVE-2024-11415

HIGH CVSS 8.8 2024-11-23
Threat Entry Updated 2025-02-05

CVE-2024-11601 - Sky Addons For Elementor Plugin

The Sky Addons for Elementor (Free Templates Library, Live Copy, Animations, Post Grid, Post Carousel, Particles, Sliders, Chart, Blog, Video Gallery) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.1. This is due to missing or incorrect nonce validation on the save_options() function. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Please note this…

PLUGIN Sky Addons For Elementor

CVE-2024-11601

HIGH CVSS 8.1 2024-11-22
Threat Entry Updated 2025-02-05

CVE-2024-11104 - Sky Addons For Elementor Plugin

The Sky Addons for Elementor (Free Templates Library, Live Copy, Animations, Post Grid, Post Carousel, Particles, Sliders, Chart, Blogs) plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the save_options() function in all versions up to, and including, 2.6.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to update arbitrary options on the WordPress site. Please note this is limited to option values that can be saved as arrays.

PLUGIN Sky Addons For Elementor

CVE-2024-11104

HIGH CVSS 8.1 2024-11-22
Threat Entry Updated 2024-11-21

CVE-2024-11409 - Grid View Gallery Plugin

The Grid View Gallery plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0 via deserialization of untrusted input from cs_all_photos_details parameter. This makes it possible for authenticated attackers, with Editor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

PLUGIN Grid View Gallery

CVE-2024-11409

HIGH CVSS 7.2 2024-11-21
Threat Entry Updated 2024-11-26

CVE-2024-10898 - Contact Form 7 Email Add On Plugin

The Contact Form 7 Email Add on plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9 via the cf7_email_add_on_add_admin_template() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php files can be uploaded and included.

PLUGIN Contact Form 7 Email Add On

CVE-2024-10898

HIGH CVSS 8.8 2024-11-21
Threat Entry Updated 2025-07-09

CVE-2024-10788 - Activity Log Plugin

The Activity Log – Monitor & Record User Changes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the event parameters in all versions up to, and including, 2.11.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrative user accesses an injected page.

PLUGIN Activity Log

CVE-2024-10788

HIGH CVSS 7.2 2024-11-21
Threat Entry Updated 2025-01-23

CVE-2024-10400 - Tutor Lms Plugin

The Tutor LMS plugin for WordPress is vulnerable to SQL Injection via the ‘rating_filter’ parameter in all versions up to, and including, 2.7.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Tutor Lms

CVE-2024-10400

HIGH CVSS 7.5 2024-11-21
Threat Entry Updated 2024-11-21

CVE-2024-10913 - Wp Clone By Wp Academy Plugin

The Clone plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.4.6 via deserialization of untrusted input in the 'recursive_unserialized_replace' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

PLUGIN Wp Clone By Wp Academy

CVE-2024-10913

HIGH CVSS 8.8 2024-11-20
Threat Entry Updated 2024-11-26

CVE-2024-10899 - Woocommerce Product Table Plugin

The The WooCommerce Product Table Lite plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.8.6. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. The same 'id' parameter is vulnerable to Reflected Cross-Site Scripting as well.

PLUGIN Woocommerce Product Table

CVE-2024-10899

HIGH CVSS 7.3 2024-11-20
Threat Entry Updated 2024-11-26

CVE-2024-10855 - Sirv Plugin

The Image Optimizer, Resizer and CDN – Sirv plugin for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to insufficient validation on the filename parameter of the sirv_upload_file_by_chunks() function and lack of in all versions up to, and including, 7.3.0. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary option values on the WordPress site. This can be leveraged to delete an option that would create an error on the site and deny service to…

PLUGIN Sirv

CVE-2024-10855

HIGH CVSS 8.1 2024-11-20
Threat Entry Updated 2024-11-19

CVE-2024-51634 - WordPress Core

Cross-Site Request Forgery (CSRF) vulnerability in Webriti WordPress Themes & Plugins Shop Webriti Custom Login allows Reflected XSS.This issue affects Webriti Custom Login: from n/a through 0.3.

CORE WordPress Core

CVE-2024-51634

HIGH CVSS 7.1 2024-11-19
Threat Entry Updated 2024-11-19

CVE-2024-11194 - Business Directory Plugin

The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a misconfigured check on the 'rtcl_import_settings' function in all versions up to, and including, 3.1.15.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update limited arbitrary options on the WordPress site. This can be leveraged to update the Subscriber role with Administrator-level capabilities to gain administrative user access to a vulnerable site. The vulnerability is limited in…

PLUGIN Business Directory

CVE-2024-11194

HIGH CVSS 8.8 2024-11-19
Threat Entry Updated 2025-07-09

CVE-2024-11038 - Wpb Popup For Contact Form 7 Plugin

The The WPB Popup for Contact Form 7 – Showing The Contact Form 7 Popup on Button Click – CF7 Popup plugin for WordPress is vulnerable to arbitrary shortcode execution via wpb_pcf_fire_contact_form AJAX action in all versions up to, and including, 1.7.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

PLUGIN Wpb Popup For Contact Form 7

CVE-2024-11038

HIGH CVSS 7.3 2024-11-19
Threat Entry Updated 2025-02-04

CVE-2024-11036 - Gamipress Plugin

The The GamiPress – The #1 gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to arbitrary shortcode execution via gamipress_get_user_earnings AJAX action in all versions up to, and including, 7.1.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

PLUGIN Gamipress

CVE-2024-11036

HIGH CVSS 7.3 2024-11-19
Threat Entry Updated 2025-01-23

CVE-2024-10388 - Wordpress Gdpr Plugin

The WordPress GDPR plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'gdpr_firstname' and 'gdpr_lastname' parameters in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wordpress Gdpr

CVE-2024-10388

HIGH CVSS 7.2 2024-11-19
Threat Entry Updated 2024-11-18

CVE-2024-9887 - Miniorange Wp As Saml Idp Plugin

The Login using WordPress Users ( WP as SAML IDP ) plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.15.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Miniorange Wp As Saml Idp

CVE-2024-9887

HIGH CVSS 7.2 2024-11-16
Threat Entry Updated 2024-11-18

CVE-2024-10645 - Blogger 301 Redirect Plugin

The Blogger 301 Redirect plugin for WordPress is vulnerable to blind time-based SQL Injection via the ‘br’ parameter in all versions up to, and including, 2.5.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Blogger 301 Redirect

CVE-2024-10645

HIGH CVSS 7.5 2024-11-16
Threat Entry Updated 2025-07-09

CVE-2024-10728 - Postx Plugin

The Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the 'install_required_plugin_callback' function in all versions up to, and including, 4.1.16. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.

PLUGIN Postx

CVE-2024-10728

HIGH CVSS 8.8 2024-11-16
Scroll to top