Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total10,857
Critical0
High0
Medium10,857
Reset
Showing 2101-2120 of 10857 records
Threat Entry Updated 2025-12-03

CVE-2025-12022 - Wsdesk Plugin

The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'eh_crm_settings_restore_trash' AJAX endpoint in all versions up to, and including, 3.3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to restore all deleted tickets.

PLUGIN Wsdesk

CVE-2025-12022

MEDIUM CVSS 4.3 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-12502 - Attention Bar Plugin

The attention-bar WordPress plugin through 0.7.2.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing high privilege users such as administrator to perform SQL injection attacks

PLUGIN Attention Bar

CVE-2025-12502

MEDIUM CVSS 6.8 2025-11-20
Threat Entry Updated 2025-11-21

CVE-2025-12778 - Wordpress User Directory Plugin

The Ultimate Member Widgets for Elementor – WordPress User Directory plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the handle_filter_users function in all versions up to, and including, 2.3. This makes it possible for unauthenticated attackers to extract partial metadata of all WordPress users, including their first name, last name and email addresses.

PLUGIN Wordpress User Directory

CVE-2025-12778

MEDIUM CVSS 5.3 2025-11-20
Threat Entry Updated 2025-11-19

CVE-2025-13085 - Seo Simplified Plugin

The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to Improper Authorization leading to Sensitive Post Meta Disclosure in versions up to and including 1.3.2. This is due to missing object-level authorization checks in the resolve_variables() AJAX handler. This makes it possible for authenticated attackers with the siteseo_manage capability (e.g., Author-level users who have been granted SiteSEO access by an administrator) to read arbitrary post metadata from any post, page, attachment, or WooCommerce order they cannot edit, via the custom field variable resolution feature granted they have been given…

PLUGIN Seo Simplified

CVE-2025-13085

MEDIUM CVSS 4.3 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12535 - Sureforms Plugin

The SureForms plugin for WordPress is vulnerable to Cross-Site Request Forgery Bypass in all versions up to, and including, 1.13.1. This is due to the plugin distributing generic WordPress REST API nonces (wp_rest) to unauthenticated users via the 'wp_ajax_nopriv_rest-nonce' action. While the plugin legitimately needs to support unauthenticated form submissions, it incorrectly uses generic REST nonces instead of form-specific nonces. This makes it possible for unauthenticated attackers to bypass CSRF protection on REST API endpoints that rely solely on nonce verification without additional authentication checks, allowing them to trigger unauthorized…

PLUGIN Sureforms

CVE-2025-12535

MEDIUM CVSS 5.3 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-13054 - User Role Editor Plugin

The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wppb-embed shortcode in all versions up to, and including, 3.14.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN User Role Editor

CVE-2025-13054

MEDIUM CVSS 6.4 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12878 - Funnel Builder Plugin

The FunnelKit – Funnel Builder for WooCommerce Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `wfop_phone` shortcode in all versions up to, and including, 3.13.1.2. This is due to insufficient input sanitization and output escaping on the user-supplied `default` attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Funnel Builder

CVE-2025-12878

MEDIUM CVSS 6.4 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12710 - Tier Management Petfinder Plugin

The Pet-Manager – Petfinder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the kwm-petfinder shortcode in all versions up to, and including, 3.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Tier Management Petfinder

CVE-2025-12710

MEDIUM CVSS 6.4 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12842 - Time Slot Plugin

The Booking Plugin for WordPress Appointments – Time Slot plugin for WordPress is vulnerable to unauthorized email sending in versions up to, and including, 1.4.7 due to missing validation on the tslot_appt_email AJAX action. This makes it possible for unauthenticated attackers to send appointment notification emails to arbitrary recipients with attacker-controlled text content in certain email fields, potentially enabling the site to be abused for phishing campaigns or spam distribution.

PLUGIN Time Slot

CVE-2025-12842

MEDIUM CVSS 5.3 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12814 - Seo Simplified Plugin

The SiteSEO – SEO Simplified plugin for WordPress is vulnerable to unauthorized modification of data due to n incorrect capability check on the siteseo_reset_settings function in all versions up to, and including, 1.3.2. This makes it possible for authenticated attackers, who have been granted access to at least on SiteSEO setting capability, to reset the plugin's settings.

PLUGIN Seo Simplified

CVE-2025-12814

MEDIUM CVSS 5.3 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12822 - Wp Login And Register Using Jwt Plugin

The WP Login and Register using JWT plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'mo_jwt_generate_new_api_key' function in all versions up to, and including, 3.0.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to generate a new API key on site's that do not have an API key configured and subsequently use that to access restricted endpoints.

PLUGIN Wp Login And Register Using Jwt

CVE-2025-12822

MEDIUM CVSS 4.3 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12751 - Wordpress Live Chat Plugin

The WSChat – WordPress Live Chat plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'reset_settings' AJAX endpoint in all versions up to, and including, 3.1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset the plugin's settings.

PLUGIN Wordpress Live Chat

CVE-2025-12751

MEDIUM CVSS 4.3 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12174 - Ai Powered Business Directory Plugin With Classified Ads Listings

The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'directorist_prepare_listings_export_file' and 'directorist_type_slug_change' AJAX actions in all versions up to, and including, 8.5.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export listing details and change the directorist slug.

PLUGIN Ai Powered Business Directory Plugin With Classified Ads Listings

CVE-2025-12174

MEDIUM CVSS 6.5 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12359 - Responsive Lightbox Plugin

The Responsive Lightbox & Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.5.3 via the 'get_image_size_by_url' function. This is due to insufficient validation of user-supplied URLs when determining image dimensions for gallery items. This makes it possible for authenticated attackers, with Author-level access and above, to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.

PLUGIN Responsive Lightbox

CVE-2025-12359

MEDIUM CVSS 5.4 2025-11-19
Threat Entry Updated 2025-12-12

CVE-2025-12426 - Quiz Maker Plugin

The Quiz Maker plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.7.0.80. This is due to the plugin exposing quiz answers through the ays_quiz_check_answer AJAX action without proper authorization checks. The endpoint only validates a nonce, but that same nonce is publicly available to all site visitors via the quiz_maker_ajax_public localized script data. This makes it possible for unauthenticated attackers to extract sensitive data including quiz answers for any quiz question.

PLUGIN Quiz Maker

CVE-2025-12426

MEDIUM CVSS 5.3 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12349 - Email Subscribers Plugin

The Icegram Express - Email Subscribers, Newsletters and Marketing Automation Plugin for WordPress is vulnerable to Authorization in versions up to, and including, 5.9.10. This is due to the plugin not properly verifying that a user is authorized to perform an action in the `trigger_mailing_queue_sending` function. This makes it possible for unauthenticated attackers to force immediate email sending, bypass the schedule, increase server load, and change plugin state (e.g., last-cron-hit), enabling abuse or DoS-like effects.

PLUGIN Email Subscribers

CVE-2025-12349

MEDIUM CVSS 5.3 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-6251 - Royal Elementor Addons Plugin

The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via $item['field_id'] in all versions up to, and including, 1.7.1036 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Royal Elementor Addons

CVE-2025-6251

MEDIUM CVSS 6.4 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12777 - Yith Woocommerce Wishlist Plugin

The YITH WooCommerce Wishlist plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.10.0. This is due to the plugin not properly verifying that a user is authorized to perform actions on the REST API /wp-json/yith/wishlist/v1/lists endpoint (which uses permission_callback => '__return_true') and the AJAX delete_item handler (which only checks nonce validity without verifying object-level authorization). This makes it possible for unauthenticated attackers to disclose wishlist tokens for any user and subsequently delete wishlist items by chaining the REST API authorization bypass with the…

PLUGIN Yith Woocommerce Wishlist

CVE-2025-12777

MEDIUM CVSS 5.3 2025-11-19
Threat Entry Updated 2025-11-19

CVE-2025-12770 - New User Approve Plugin

The New User Approve plugin for WordPress is vulnerable to unauthorized data disclosure in all versions up to, and including, 3.0.9 due to insufficient API key validation using loose equality comparison. This makes it possible for unauthenticated attackers to retrieve personally identifiable information (PII), including usernames and email addresses of users with various approval statuses via the Zapier REST API endpoints, by exploiting PHP type juggling with the api_key parameter set to "0" on sites where the Zapier API key has not been configured.

PLUGIN New User Approve

CVE-2025-12770

MEDIUM CVSS 5.3 2025-11-19
Scroll to top