Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total10,777
Critical0
High0
Medium10,777
Reset
Showing 281-300 of 10777 records
Threat Entry Updated 2026-04-15

CVE-2026-2687 - Reading Progressbar Plugin

The Reading progressbar WordPress plugin before 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

PLUGIN Reading Progressbar

CVE-2026-2687

MEDIUM CVSS 4.3 2026-03-12
Threat Entry Updated 2026-03-12

CVE-2026-3226 - LearnPress – WordPress LMS Plugin for Create and Sell Online Courses

The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to unauthorized email notification triggering due to missing capability checks on all 10 functions in the SendEmailAjax class in all versions up to, and including, 4.3.2.8. The AbstractAjax::catch_lp_ajax() dispatcher verifies a wp_rest nonce but performs no current_user_can() check before dispatching to handler functions. The wp_rest nonce is embedded in the frontend JavaScript for all authenticated users. This makes it possible for authenticated attackers, with Subscriber-level access and above, to trigger arbitrary email notifications to admins, instructors, and users, enabling…

PLUGIN LearnPress – WordPress LMS Plugin for Create and Sell Online Courses

CVE-2026-3226

MEDIUM CVSS 4.3 2026-03-12
Threat Entry Updated 2026-03-11

CVE-2026-3492 - Gravity Forms Plugin

The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.9.28.1. This is due to a compound failure involving missing authorization on the `create_from_template` AJAX endpoint (allowing any authenticated user to create forms), insufficient input sanitization (`sanitize_text_field()` preserves single quotes), and missing output escaping when the form title is rendered in the Form Switcher dropdown (`title` attribute constructed without `esc_attr()`, and JavaScript `saferHtml` utility only escapes `&`, `` but not quotes). This makes it possible for authenticated attackers, with Subscriber-level access…

PLUGIN Gravity Forms

CVE-2026-3492

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3906 - WordPress Core

WordPress core is vulnerable to unauthorized access in versions 6.9 through 6.9.1. The Notes feature (block-level collaboration annotations) was introduced in WordPress 6.9 to allow editorial comments directly on posts in the block editor. However, the REST API `create_item_permissions_check()` method in the comments controller did not verify that the authenticated user has `edit_post` permission on the target post when creating a note. This makes it possible for authenticated attackers with Subscriber-level access to create notes on any post, including posts authored by other users, private posts, and posts in any…

CORE WordPress Core

CVE-2026-3906

MEDIUM CVSS 4.3 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3903 - And Backup Multiple Websites Plugin

The Modular DS: Monitor, update, and backup multiple websites plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.1. This is due to missing nonce validation on the postConfirmOauth() function. This makes it possible for unauthenticated attackers to disconnect the plugin's OAuth/SSO connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN And Backup Multiple Websites

CVE-2026-3903

MEDIUM CVSS 4.3 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2918 - Happy Addons For Elementor Plugin

The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_condition_update` AJAX action. This is due to the `validate_reqeust()` method using `current_user_can('edit_posts', $template_id)` instead of `current_user_can('edit_post', $template_id)` — failing to perform object-level authorization. Additionally, the `ha_get_current_condition` AJAX action lacks a capability check. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify the display conditions of any published `ha_library` template. Because the `cond_to_html()` renderer outputs condition values into HTML attributes without…

PLUGIN Happy Addons For Elementor

CVE-2026-2918

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2917 - Happy Addons For Elementor Plugin

The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_duplicate_thing` admin action handler. This is due to the `can_clone()` method only checking `current_user_can('edit_posts')` (a general capability) without performing object-level authorization such as `current_user_can('edit_post', $post_id)`, and the nonce being tied to the generic action name `ha_duplicate_thing` rather than to a specific post ID. This makes it possible for authenticated attackers, with Contributor-level access and above, to clone any published post, page, or custom post type…

PLUGIN Happy Addons For Elementor

CVE-2026-2917

MEDIUM CVSS 5.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3534 - Astra Plugin

The Astra theme for WordPress is vulnerable to Stored Cross-Site Scripting via the `ast-page-background-meta` and `ast-content-background-meta` post meta fields in all versions up to, and including, 4.12.3. This is due to insufficient input sanitization on meta registration and missing output escaping in the `astra_get_responsive_background_obj()` function for four CSS-context sub-properties (`background-color`, `background-image`, `overlay-color`, `overlay-gradient`). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Astra

CVE-2026-3534

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2707 - weForms – Easy Drag & Drop Contact Form Builder For WordPress Plugin

The weForms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the REST API entry submission endpoint in all versions up to, and including, 1.6.27. This is due to inconsistent input sanitization between the frontend AJAX handler and the REST API endpoint. When entries are submitted via the REST API (`/wp-json/weforms/v1/forms/{id}/entries/`), the `prepare_entry()` method in `class-abstract-fields.php` receives the WP_REST_Request object as `$args`, bypassing the `weforms_clean()` fallback that sanitizes `$_POST` data for frontend submissions. The base field handler only applies `trim()` to the value. This makes it possible for authenticated…

PLUGIN weForms – Easy Drag & Drop Contact Form Builder For WordPress

CVE-2026-2707

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2358 - WP ULike – Like & Dislike Buttons for Engagement and Feedback Plugin

The WP ULike plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `[wp_ulike_likers_box]` shortcode `template` attribute in all versions up to, and including, 5.0.1. This is due to the use of `html_entity_decode()` on shortcode attributes without subsequent output sanitization, which effectively bypasses WordPress's `wp_kses_post()` content filtering. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The post must have at least one like for the XSS to render.

PLUGIN WP ULike – Like & Dislike Buttons for Engagement and Feedback

CVE-2026-2358

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-04-15

CVE-2026-1753 - Gutena Forms Plugin

The Gutena Forms WordPress plugin before 1.6.1 does not validate option to be updated, which could allow contributors and above role to update arbitrary boolean and array options (such as users_can_register).

PLUGIN Gutena Forms

CVE-2026-1753

MEDIUM CVSS 6.8 2026-03-11
Threat Entry Updated 2026-04-15

CVE-2026-1867 - Front Editor Plugin

The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6 allows passing a URL parameter to regenerate a .json file based on demo data that it initially creates. If an administrator modifies the demo form and enables admin notifications in the Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6's settings, it is possible for an unauthenticated attacker to export and download all of the form data/settings, including the administrator's email address.

PLUGIN Front Editor

CVE-2026-1867

MEDIUM CVSS 5.9 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-1781 - Mailchimp For Wp Plugin

The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 4.11.1. This is due to the plugin trusting the `_mc4wp_action` POST parameter without validation, allowing unauthenticated attackers to force the form to process unsubscribe actions instead of subscribe actions. This makes it possible for unauthenticated attackers to arbitrarily unsubscribe any email address from the connected Mailchimp audience via the `_mc4wp_action` parameter, granted they can obtain the form ID (which is publicly exposed in the HTML source).

PLUGIN Mailchimp For Wp

CVE-2026-1781

MEDIUM CVSS 6.5 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2324 - Calendar Booking Plugin For Appointments And Events

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.2.7. This is due to missing or incorrect nonce validation on the reload_preview() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Calendar Booking Plugin For Appointments And Events

CVE-2026-2324

MEDIUM CVSS 6.1 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2569 - Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer Plugin

The Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via PDF page labels in all versions up to, and including, 2.4.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer

CVE-2026-2569

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3228 - NextScripts: Social Networks Auto-Poster Plugin

The NextScripts: Social Networks Auto-Poster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `[nxs_fbembed]` shortcode in all versions up to, and including, 4.4.6. This is due to insufficient input sanitization and output escaping on the `snapFB` post meta value. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN NextScripts: Social Networks Auto-Poster

CVE-2026-3228

MEDIUM CVSS 6.4 2026-03-10
Threat Entry Updated 2026-03-11

CVE-2026-1920 - Booktics – Booking Calendar for Appointments and Service Businesses Plugin

The Booking Calendar for Appointments and Service Businesses – Booktics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'Extension_Controller::update_item_permissions_check' function in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to install addon plugins.

PLUGIN Booktics – Booking Calendar for Appointments and Service Businesses

CVE-2026-1920

MEDIUM CVSS 5.3 2026-03-10
Threat Entry Updated 2026-03-11

CVE-2026-1919 - Booktics – Booking Calendar for Appointments and Service Businesses Plugin

The Booking Calendar for Appointments and Service Businesses – Booktics plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple REST API endpoints in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to query sensitive data.

PLUGIN Booktics – Booking Calendar for Appointments and Service Businesses

CVE-2026-1919

MEDIUM CVSS 5.3 2026-03-10
Threat Entry Updated 2026-04-15

CVE-2026-1508 - Court Reservation Plugin

The Court Reservation WordPress plugin before 1.10.9 does not have CSRF check in place when deleting events, which could allow attackers to make a logged in admin delete them via a CSRF attack

PLUGIN Court Reservation

CVE-2026-1508

MEDIUM CVSS 4.3 2026-03-10
Threat Entry Updated 2026-03-09

CVE-2026-2433 - RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging Plugin

The RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging plugin for WordPress is vulnerable to DOM-Based Cross-Site Scripting via postMessage in all versions up to, and including, 5.0.11. This is due to the plugin's admin-shell.js registering a global message event listener without origin validation (missing event.origin check) and directly passing user-controlled URLs to window.open() without URL scheme validation. This makes it possible for unauthenticated attackers to execute arbitrary JavaScript in the context of an authenticated administrator's session by tricking them into visiting a malicious website that…

PLUGIN RSS Aggregator – RSS Import, News Feeds, Feed to Post, and Autoblogging

CVE-2026-2433

MEDIUM CVSS 6.1 2026-03-07
Scroll to top