Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total10,759
Critical0
High0
Medium10,759
Reset
Showing 181-200 of 10759 records
Threat Entry Updated 2026-03-23

CVE-2026-3335 - Canto Plugin

The Canto plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.1.1 via the `/wp-content/plugins/canto/includes/lib/copy-media.php` file. This is due to the file being directly accessible without any authentication, authorization, or nonce checks, and the `fbc_flight_domain` and `fbc_app_api` URL components being accepted as user-supplied POST parameters rather than read from admin-configured options. Since the attacker controls both the destination server and the `fbc_app_token` value, the entire fetch-and-upload chain is attacker-controlled — the server never contacts Canto's legitimate API, and the uploaded file originates entirely from…

PLUGIN Canto

CVE-2026-3335

MEDIUM CVSS 5.3 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-3332 - Xhanch – My Advanced Settings Plugin

The Xhanch - My Advanced Settings plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.2. This is due to missing nonce validation in the `xms_setting()` function on the settings update handler. This makes it possible for unauthenticated attackers to modify plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Settings that can be modified include favicon URL, Google Analytics account ID, and various WordPress behavior toggles. The `favicon_url`…

PLUGIN Xhanch – My Advanced Settings

CVE-2026-3332

MEDIUM CVSS 4.3 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-3331 - Lobot Slider Administrator Plugin

The Lobot Slider Administrator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.6.0. This is due to missing or incorrect nonce validation on the fourty_slider_options_page function. This makes it possible for unauthenticated attackers to modify plugin slider-page configuration via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Lobot Slider Administrator

CVE-2026-3331

MEDIUM CVSS 4.3 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2723 - Post Snippits Plugin

The Post Snippits plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing nonce validation on the settings page handlers for saving, adding, and deleting snippets. This makes it possible for unauthenticated attackers to modify plugin settings and inject malicious scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Post Snippits

CVE-2026-2723

MEDIUM CVSS 6.1 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2837 - Ricerca – advanced search Plugin

The Ricerca – advanced search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin's settings in all versions up to, and including, 1.1.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Ricerca – advanced search

CVE-2026-2837

MEDIUM CVSS 4.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2720 - Hr Press Lite Plugin

The Hr Press Lite plugin for WordPress is vulnerable to unauthorized access of sensitive employee data due to a missing capability check on the `hrp-fetch-employees` AJAX action in all versions up to, and including, 1.0.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve sensitive employee information including names, email addresses, phone numbers, salary/pay rates, employment dates, and employment status.

PLUGIN Hr Press Lite

CVE-2026-2720

MEDIUM CVSS 6.5 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2503 - Element Camp Plugin

The ElementCamp plugin for WordPress is vulnerable to time-based SQL Injection via the 'meta_query[compare]' parameter in the 'tcg_select2_search_post' AJAX action in all versions up to, and including, 2.3.6. This is due to the user-supplied compare value being placed as an SQL operator in the query without validation against an allowlist of comparison operators. The value is passed through esc_sql(), but since the payload operates as an operator (not inside quotes), esc_sql() has no effect on payloads that don't contain quote characters. This makes it possible for authenticated attackers, with Author-level…

PLUGIN Element Camp

CVE-2026-2503

MEDIUM CVSS 6.5 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2501 - Ed's Social Share Plugin

The Ed's Social Share plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `social_share` shortcode in all versions up to, and including, 2.0. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Ed's Social Share

CVE-2026-2501

MEDIUM CVSS 6.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2496 - Ed's Font Awesome Plugin

The Ed's Font Awesome plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `eds_font_awesome` shortcode in all versions up to, and including, 2.0. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Ed's Font Awesome

CVE-2026-2496

MEDIUM CVSS 6.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2427 - Itsukaita Plugin

The itsukaita plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'day_from' and 'day_to' parameters in all versions up to, and including, 0.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.

PLUGIN Itsukaita

CVE-2026-2427

MEDIUM CVSS 6.1 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2424 - Reward Video Ad For Wordpress Plugin

The Reward Video Ad for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.6. This is due to insufficient input sanitization and output escaping on plugin settings such as the 'Account ID', 'Message before the video', and color fields. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Reward Video Ad For Wordpress

CVE-2026-2424

MEDIUM CVSS 4.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2375 - App Builder – Create Native Android & iOS Apps On The Flight Plugin

The App Builder – Create Native Android & iOS Apps On The Flight plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 5.5.10. This is due to the `verify_role()` function in `AuthTrails.php` explicitly whitelisting the `wcfm_vendor` role alongside `subscriber` and `customer`, and assigning it directly via `wp_insert_user()` without integrating with WCFM Marketplace's vendor approval workflow. This makes it possible for unauthenticated attackers to register an account with the `wcfm_vendor` role by supplying the `role` parameter in the `/wp-json/app-builder/v1/register` REST API endpoint, bypassing the standard…

PLUGIN App Builder – Create Native Android & iOS Apps On The Flight

CVE-2026-2375

MEDIUM CVSS 6.5 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2351 - Task Manager Plugin

The Task Manager plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.0.2 via the callback_get_text_from_url() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

PLUGIN Task Manager

CVE-2026-2351

MEDIUM CVSS 6.5 2026-03-21
Threat Entry Updated 2026-04-08

CVE-2026-2290 - Post Affiliate Pro Plugin

The Post Affiliate Pro plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.28.0. This makes it possible for authenticated attackers, with Administrator-level access, to make web requests to initiate arbitrary outbound requests from the application and read the returned response content. Successful exploitation was confirmed by receiving and observing response data from an external Collaborator endpoint.

PLUGIN Post Affiliate Pro

CVE-2026-2290

MEDIUM CVSS 6.5 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2294 - Uipress Lite Plugin

The UiPress lite | Effortless custom dashboards, admin themes and pages plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'uip_save_global_settings' function in all versions up to, and including, 3.5.09. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary plugin settings.

PLUGIN Uipress Lite

CVE-2026-2294

MEDIUM CVSS 4.3 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2277 - Rexcrawler Plugin

The rexCrawler plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'url' and 'regex' parameters in the search-pattern tester page in all versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Rexcrawler

CVE-2026-2277

MEDIUM CVSS 6.1 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2121 - Weaver Show Posts Plugin

The Weaver Show Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'add_class' parameter in all versions up to, and including, 1.8.1. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This primarily affects multisite installations where Administrators do not have the unfiltered_html capability.

PLUGIN Weaver Show Posts

CVE-2026-2121

MEDIUM CVSS 4.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-1914 - Fusedesk Plugin

The FuseDesk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's fusedesk_newcase shortcode in all versions up to, and including, 6.8 due to insufficient input sanitization and output escaping on the 'emailtext' attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Fusedesk

CVE-2026-1914

MEDIUM CVSS 6.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-1911 - Twitter Feeds Plugin

The Twitter Feeds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tweet_title' parameter in the 'TwitterFeeds' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Twitter Feeds

CVE-2026-1911

MEDIUM CVSS 6.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-1908 - Integration With Hubspot Forms Plugin

The Integration with Hubspot Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'hubspotform' shortcode in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Integration With Hubspot Forms

CVE-2026-1908

MEDIUM CVSS 6.4 2026-03-21
Scroll to top