Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total10,866
Critical0
High0
Medium10,866
Reset
Showing 3481-3500 of 10866 records
Threat Entry Updated 2025-05-16

CVE-2024-8988 - File Uploads Plugin

The PeepSo Core: File Uploads plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.4.6.0 via the file_download REST API endpoint due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to download files uploaded by others users and expose potentially sensitive information.

PLUGIN File Uploads

CVE-2024-8988

MEDIUM CVSS 5.3 2025-05-14
Threat Entry Updated 2025-05-16

CVE-2024-13940 - Ninja Forms Webhooks Plugin

The Ninja Forms Webhooks plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.0.7 via the form webhook functionality. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Ninja Forms Webhooks

CVE-2024-13940

MEDIUM CVSS 5.5 2025-05-14
Threat Entry Updated 2025-08-12

CVE-2025-4520 - Uncanny Automator Plugin

The Uncanny Automator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in versions up to, and including, 6.4.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update plugin settings.

PLUGIN Uncanny Automator

CVE-2025-4520

MEDIUM CVSS 5.4 2025-05-14
Threat Entry Updated 2025-05-13

CVE-2025-4339 - Thegem Theme

The TheGem theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajaxApi() function in all versions up to, and including, 5.10.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary theme options.

THEME Thegem

CVE-2025-4339

MEDIUM CVSS 4.3 2025-05-13
Threat Entry Updated 2025-05-13

CVE-2025-3107 - Newsletters Lite Plugin

The Newsletters plugin for WordPress is vulnerable to time-based SQL Injection via the ‘orderby' parameter in all versions up to, and including, 4.9.9.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Newsletters Lite

CVE-2025-3107

MEDIUM CVSS 6.5 2025-05-13
Threat Entry Updated 2025-06-05

CVE-2025-3649 - Lightpress Lightbox Plugin

The LightPress Lightbox WordPress plugin before 2.3.4 does not check download links point to valid, non-Javascript URLs, allowing users with at least the contributor role to conduct Stored XSS attacks.

PLUGIN Lightpress Lightbox

CVE-2025-3649

MEDIUM CVSS 6.8 2025-05-12
Threat Entry Updated 2025-06-05

CVE-2025-3597 - Firelight Lightbox Plugin

The Firelight Lightbox WordPress plugin before 2.3.15 does not prevent users with post writing capabilities from executing arbitrary Javascript when the jQuery Metadata library is enabled. While this feature is meant to only be available to Pro version users, it can be activated in the free version too, making it theoretically exploitable there as well.

PLUGIN Firelight Lightbox

CVE-2025-3597

MEDIUM CVSS 5.9 2025-05-12
Threat Entry Updated 2025-05-21

CVE-2025-3878 - Sms Alert Order Notifications Plugin

The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sa_verify shortcode in all versions up to, and including, 3.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Sms Alert Order Notifications

CVE-2025-3878

MEDIUM CVSS 6.4 2025-05-10
Threat Entry Updated 2025-05-12

CVE-2025-2944 - Jeg Elementor Kit Plugin

The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Video Button and Countdown Widgets in all versions up to, and including, 2.6.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Jeg Elementor Kit

CVE-2025-2944

MEDIUM CVSS 6.4 2025-05-10
Threat Entry Updated 2025-05-12

CVE-2025-3794 - Wpforms Lite Plugin

The WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the start_timestamp parameter in all versions up to, and including, 1.9.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wpforms Lite

CVE-2025-3794

MEDIUM CVSS 5.4 2025-05-09
Threat Entry Updated 2025-05-12

CVE-2025-3897 - Eucookielaw Plugin

The EUCookieLaw plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.7.2 via the 'file_get_contents' function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. The vulnerability can only be exploited if a caching plugin such as W3 Total Cache is installed and activated.

PLUGIN Eucookielaw

CVE-2025-3897

MEDIUM CVSS 5.9 2025-05-09
Threat Entry Updated 2025-05-12

CVE-2025-3949 - Coming Soon Plugin

The Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'seedprod_lite_get_revisisons' function in all versions up to, and including, 6.18.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the content of arbitrary landing page revisions.

PLUGIN Coming Soon

CVE-2025-3949

MEDIUM CVSS 4.3 2025-05-09
Threat Entry Updated 2025-06-04

CVE-2025-3862 - Contest Gallery Plugin

Contest Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 26.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Contest Gallery

CVE-2025-3862

MEDIUM CVSS 6.4 2025-05-08
Threat Entry Updated 2025-06-04

CVE-2025-4208 - Nex Forms Plugin

The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to Limited Code Execution in all versions up to, and including, 8.9.1 via the get_table_records function. This is due to the unsanitized use of user-supplied input in call_user_func(). This makes it possible for authenticated attackers, with Custom-level access, to execute arbitrary PHP functions that meet specific constraints (static methods or global functions accepting a single array parameter).

PLUGIN Nex Forms

CVE-2025-4208

MEDIUM CVSS 6.3 2025-05-08
Threat Entry Updated 2025-06-04

CVE-2025-3468 - Nex Forms Plugin

The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the clean_html and form_fields parameters in all versions up to, and including, 8.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Custom-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Nex Forms

CVE-2025-3468

MEDIUM CVSS 6.4 2025-05-08
Threat Entry Updated 2025-06-04

CVE-2025-2806 - Tagdiv Composer Plugin

The tagDiv Composer plugin for WordPress, used by the Newspaper theme, is vulnerable to Reflected Cross-Site Scripting via the ‘data’ parameter in all versions up to, and including, 5.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Tagdiv Composer

CVE-2025-2806

MEDIUM CVSS 6.1 2025-05-08
Threat Entry Updated 2025-06-04

CVE-2025-4127 - Wp Seo Structured Data Schema Plugin

The WP SEO Structured Data Schema plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Price Range’ parameter in all versions up to, and including, 2.7.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts that will execute whenever an administrator accesses the plugin settings page.

PLUGIN Wp Seo Structured Data Schema

CVE-2025-4127

MEDIUM CVSS 6.4 2025-05-08
Threat Entry Updated 2025-05-07

CVE-2025-4171 - Display What Visitors Are Reading Plugin

The WZ Followed Posts – Display what visitors are reading plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wfp' shortcode in all versions up to, and including, 3.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Display What Visitors Are Reading

CVE-2025-4171

MEDIUM CVSS 6.4 2025-05-07
Threat Entry Updated 2025-07-11

CVE-2024-12120 - Royal Elementor Addons And Templates Plugin

The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown widget display_message_text parameter in all versions up to, and including, 1.7.1017 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Royal Elementor Addons And Templates

CVE-2024-12120

MEDIUM CVSS 5.4 2025-05-07
Threat Entry Updated 2025-05-07

CVE-2025-3766 - Login Lockdown Plugin

The Login Lockdown & Protection plugin for WordPress is vulnerable to unauthorized nonce access due to a missing capability check on the ajax_run_tool function in all versions up to, and including, 2.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to obtain a valid nonce that can be used to generate a global unlock key, which can in turn be used to add arbitrary IP address to the plugin allowlist. This can only by exploited on new installations where the site administrator hasn't visited the loginlockdown…

PLUGIN Login Lockdown

CVE-2025-3766

MEDIUM CVSS 5.4 2025-05-07
Scroll to top