Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total10,759
Critical0
High0
Medium10,759
Reset
Showing 221-240 of 10759 records
Threat Entry Updated 2026-03-23

CVE-2026-1093 - Accordion Plugin For Gutenberg

The WPFAQBlock– FAQ & Accordion Plugin For Gutenberg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'class' parameter of the 'wpfaqblock' shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Accordion Plugin For Gutenberg

CVE-2026-1093

MEDIUM CVSS 6.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-0609 - Logo Slider – Logo Carousel, Logo Showcase & Client Logo Slider Plugin

The Logo Slider – Logo Carousel, Logo Showcase & Client Logo Slider Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image alt text in all versions up to, and including, 4.9.0 due to insufficient input sanitization and output escaping in the 'logo-slider' shortcode. This makes it possible for authenticated attackers, with author level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Logo Slider – Logo Carousel, Logo Showcase & Client Logo Slider Plugin

CVE-2026-0609

MEDIUM CVSS 6.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-1247 - Survey Plugin

The Survey plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Survey

CVE-2026-1247

MEDIUM CVSS 4.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-4083 - Scoreboard For Html5 Game Lite Plugin

The Scoreboard for HTML5 Games Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'scoreboard' shortcode in all versions up to, and including, 1.2. The shortcode function sfhg_shortcode() allows arbitrary HTML attributes to be added to the rendered element, with only a small blacklist of four attribute names (same_height_as, onload, onpageshow, onclick) being blocked. While the attribute names are passed through esc_html() and values through esc_attr(), this does not prevent injection of JavaScript event handler attributes like onfocus, onmouseover, onmouseenter, etc., because these attribute names and simple…

PLUGIN Scoreboard For Html5 Game Lite

CVE-2026-4083

MEDIUM CVSS 6.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-3516 - Contact List Plugin

The Contact List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_cl_map_iframe' parameter in all versions up to, and including, 3.0.18. This is due to insufficient input sanitization and output escaping when handling the Google Maps iframe custom field. The saveCustomFields() function in class-contact-list-custom-fields.php uses a regex to extract tags from user input but does not validate or sanitize the iframe's attributes, allowing event handlers like 'onload' to be included. The extracted iframe HTML is stored via update_post_meta() and later rendered on the front-end in class-cl-public-card.php without…

PLUGIN Contact List

CVE-2026-3516

MEDIUM CVSS 6.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-3572 - Itracker360 Plugin

The iTracker360 plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Stored Cross-Site Scripting in all versions up to and including 2.2.0. This is due to missing nonce verification on the settings form submission and insufficient input sanitization combined with missing output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via a forged request granted they can trick an administrator into performing an action such as clicking on a link.

PLUGIN Itracker360

CVE-2026-3572

MEDIUM CVSS 6.1 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-3567 - Computer Repair Shop Plugin

The RepairBuddy – Repair Shop CRM & Booking Plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 4.1132. The plugin exposes two AJAX handlers that, when combined, allow any authenticated user to modify admin-level plugin settings. First, the wc_rb_get_fresh_nonce() function (registered via wp_ajax and wp_ajax_nopriv hooks) allows any user to generate a valid WordPress nonce for any arbitrary action name by simply providing the nonce_name parameter, with no capability checks. Second, the wc_rep_shop_settings_submission() function only verifies the nonce (wcrb_main_setting_nonce) but performs no current_user_can() capability…

PLUGIN Computer Repair Shop

CVE-2026-3567

MEDIUM CVSS 5.3 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-3474 - EmailKit – Email Customizer for WooCommerce & WP Plugin

The EmailKit – Email Customizer for WooCommerce & WP plugin for WordPress is vulnerable to arbitrary file read via path traversal in all versions up to, and including, 1.6.3. This is due to the action() function in the TemplateData class passing user-supplied input from the 'emailkit-editor-template' REST API parameter directly to file_get_contents() without any path validation, sanitization, or restriction to an allowed directory. This makes it possible for authenticated attackers, with Administrator-level access, to read arbitrary files on the server (such as /etc/passwd or wp-config.php) by supplying a traversal path.…

PLUGIN EmailKit – Email Customizer for WooCommerce & WP

CVE-2026-3474

MEDIUM CVSS 4.9 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-3577 - Keep Backup Daily Plugin

The Keep Backup Daily plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the backup title alias (`val` parameter) in the `update_kbd_bkup_alias` AJAX action in all versions up to, and including, 2.1.2. This is due to insufficient input sanitization and output escaping. While `sanitize_text_field()` strips HTML tags on save, it does not encode double quotes. The backup titles are output in HTML attribute contexts without `esc_attr()`. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts via attribute injection that will execute…

PLUGIN Keep Backup Daily

CVE-2026-3577

MEDIUM CVSS 4.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-3350 - Image Alt Text Manager – Bulk & Dynamic Alt Tags For image SEO Optimization + AI Plugin

The Image Alt Text Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the post title in all versions up to, and including, 1.8.2. This is due to insufficient input sanitization and output escaping when dynamically generating image alt and title attributes using a DOM parser. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Image Alt Text Manager – Bulk & Dynamic Alt Tags For image SEO Optimization + AI

CVE-2026-3350

MEDIUM CVSS 6.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2430 - Autoptimize Plugin

The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the lazy-loading image processing in all versions up to, and including, 3.1.14. This is due to the use of an overly permissive regular expression in the `add_lazyload` function that replaces all occurrences of `\ssrc=` in image tags without limiting to the actual attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page by crafting an image tag where…

PLUGIN Autoptimize

CVE-2026-2430

MEDIUM CVSS 6.4 2026-03-21
Threat Entry Updated 2026-03-23

CVE-2026-2352 - Autoptimize Plugin

The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ao_post_preload' meta value in all versions up to, and including, 3.1.14. This is due to insufficient input sanitization in the `ao_metabox_save()` function and missing output escaping when the value is rendered into a `` tag in `autoptimizeImages.php`. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page, granted the "Image optimization" or "Lazy-load images" setting is enabled in…

PLUGIN Autoptimize

CVE-2026-2352

MEDIUM CVSS 6.4 2026-03-21
Threat Entry Updated 2026-03-20

CVE-2026-3550 - Ft Rockpress Plugin

The RockPress plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0.17. This is due to missing capability checks on multiple AJAX actions (rockpress_import, rockpress_import_status, rockpress_last_import, rockpress_reset_import, and rockpress_check_services) combined with the plugin's nonce being exposed to all authenticated users via an unconditionally enqueued admin script. The plugin enqueues the 'rockpress-admin' script on all admin pages (including profile.php) without any page or capability restrictions, and the nonce for the 'rockpress-nonce' action is passed to this script via wp_localize_script. Since the AJAX handlers only verify…

PLUGIN Ft Rockpress

CVE-2026-3550

MEDIUM CVSS 5.3 2026-03-20
Threat Entry Updated 2026-03-20

CVE-2026-2421 - Ilghera Carta Docente For Woocommerce Plugin

The ilGhera Carta Docente for WooCommerce plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.0 via the 'cert' parameter of the 'wccd-delete-certificate' AJAX action. This is due to insufficient file path validation before performing a file deletion. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, such as wp-config.php, which can make site takeover and remote code execution possible.

PLUGIN Ilghera Carta Docente For Woocommerce

CVE-2026-2421

MEDIUM CVSS 6.5 2026-03-20
Threat Entry Updated 2026-03-20

CVE-2026-2432 - Cm Custom Reports Plugin

The CM Custom Reports – Flexible reporting to track what matters most plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Cm Custom Reports

CVE-2026-2432

MEDIUM CVSS 4.4 2026-03-20
Threat Entry Updated 2026-03-20

CVE-2026-4136 - Restrict Content Plugin

The Membership Plugin – Restrict Content plugin for WordPress is vulnerable to Unvalidated Redirect in all versions up to, and including, 3.2.24. This is due to insufficient validation on the redirect url supplied via the 'rcp_redirect' parameter. This makes it possible for unauthenticated attackers to redirect users with the password reset email to potentially malicious sites if they can successfully trick them into performing an action.

PLUGIN Restrict Content

CVE-2026-4136

MEDIUM CVSS 4.3 2026-03-20
Threat Entry Updated 2026-03-19

CVE-2026-3475 - Instant Popup Builder Plugin

The Instant Popup Builder plugin for WordPress is vulnerable to Unauthenticated Arbitrary Shortcode Execution in all versions up to and including 1.1.7. This is due to the handle_email_verification_page() function constructing a shortcode string from user-supplied GET parameters (token, email) and passing it to do_shortcode() without properly sanitizing square bracket characters, combined with missing authorization checks on the init hook. While sanitize_text_field() and esc_attr() are applied, neither function strips or escapes square bracket characters ([ and ]). WordPress's shortcode regex uses [^\]\/]* to match content inside shortcode tags, meaning a ]…

PLUGIN Instant Popup Builder

CVE-2026-3475

MEDIUM CVSS 5.3 2026-03-19
Threat Entry Updated 2026-03-19

CVE-2026-4120 - Info Cards Plugin

The Info Cards – Add Text and Media in Card Layouts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'btnUrl' parameter within the Info Cards block in all versions up to, and including, 2.0.7. This is due to insufficient input validation on URL schemes, specifically the lack of javascript: protocol filtering. The block's render.php passes all attributes as JSON to the frontend via a data-attributes HTML attribute using esc_attr(wp_json_encode()), which prevents HTML attribute injection but does not validate URL protocols within the JSON data. The client-side view.js…

PLUGIN Info Cards

CVE-2026-4120

MEDIUM CVSS 6.4 2026-03-19
Threat Entry Updated 2026-03-19

CVE-2026-4068 - Add Custom Fields To Media Plugin

The Add Custom Fields to Media plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.3. This is due to missing nonce validation on the field deletion functionality in the admin display template. The plugin properly validates a nonce for the 'add field' operation (line 24-36), but the 'delete field' operation (lines 38-49) processes the $_GET['delete'] parameter and calls update_option() without any nonce verification. This makes it possible for unauthenticated attackers to delete arbitrary custom media fields via a forged request, granted they…

PLUGIN Add Custom Fields To Media

CVE-2026-4068

MEDIUM CVSS 4.3 2026-03-19
Threat Entry Updated 2026-03-19

CVE-2026-4006 - Simple Draft List Plugin

The Simple Draft List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'display_name' post meta (Custom Field) in all versions up to and including 2.6.2. This is due to insufficient input sanitization and output escaping on the author display name when no author URL is present. The plugin accesses `$draft_data->display_name` which, because `display_name` is not a native WP_Post property, triggers WP_Post::__get() and resolves to `get_post_meta($post_id, 'display_name', true)`. When the `user_url` meta field is empty, the `$author` value is assigned to `$author_link` on line 383 without any escaping…

PLUGIN Simple Draft List

CVE-2026-4006

MEDIUM CVSS 6.4 2026-03-19
Scroll to top