Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total10,759
Critical0
High0
Medium10,759
Reset
Showing 21-40 of 10759 records
Threat Entry Updated 2026-04-14

CVE-2026-4479 - Wholesale Products Dynamic Pricing Management Woocommerce Plugin

The WholeSale Products Dynamic Pricing Management WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Wholesale Products Dynamic Pricing Management Woocommerce

CVE-2026-4479

MEDIUM CVSS 4.4 2026-04-14
Threat Entry Updated 2026-04-14

CVE-2026-1607 - Surbma Bookingcom Shortcode Plugin

The Surbma | Booking.com Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `surbma-bookingcom` shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Surbma Bookingcom Shortcode

CVE-2026-1607

MEDIUM CVSS 6.4 2026-04-14
Threat Entry Updated 2026-04-13

CVE-2026-6203 - User Registration Plugin

The User Registration & Membership plugin for WordPress is vulnerable to Open Redirect in versions up to and including 5.1.4. This is due to insufficient validation of user-supplied URLs passed via the 'redirect_to_on_logout' GET parameter before redirecting users. The `redirect_to_on_logout` GET parameter is passed directly to WordPress's `wp_redirect()` function instead of the domain-restricted `wp_safe_redirect()`. While `esc_url_raw()` is applied to sanitize malformed URLs, it does not restrict the redirect destination to the local domain, allowing an attacker to craft a specially formed link that redirects users to potentially malicious external URLs…

PLUGIN User Registration

CVE-2026-6203

MEDIUM CVSS 6.1 2026-04-13
Threat Entry Updated 2026-04-13

CVE-2026-5226 - Optimize Images In Real Time Plugin

The Optimole – Optimize Images in Real Time plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URL paths in versions up to, and including, 4.2.3 This is due to insufficient output escaping on user-supplied URL paths in the get_current_url() function, which are inserted into JavaScript code via str_replace() without proper JavaScript context escaping in the replace_content() function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on…

PLUGIN Optimize Images In Real Time

CVE-2026-5226

MEDIUM CVSS 6.1 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-5207 - Lifterlms Plugin

The LifterLMS plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter in all versions up to, and including, 9.2.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Instructor-level access and above who have the edit_post capability on the quiz, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Lifterlms

CVE-2026-5207

MEDIUM CVSS 6.5 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-4895 - Greenshift Animation And Page Builder Blocks Plugin

The GreenShift - Animation and Page Builder Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 12.8.9 This is due to insufficient input sanitization and output escaping in the gspb_greenShift_block_script_assets() function. The function uses str_replace() to insert 'fetchpriority="high"' before 'src=' attributes when processing greenshift-blocks/image blocks with the disablelazy attribute enabled. Because this replacement operates on the entire HTML string without parsing, contributors can inject the string 'src=' into HTML attribute values (such as class attributes). When the str_replace executes, the double quotes in…

PLUGIN Greenshift Animation And Page Builder Blocks

CVE-2026-4895

MEDIUM CVSS 6.4 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-3498 - Blockart Blocks Plugin

The BlockArt Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'clientId' block attribute in all versions up to, and including, 2.2.15. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Blockart Blocks

CVE-2026-3498

MEDIUM CVSS 6.4 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-4979 - Members Directory Plugin For Wp

The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP plugin for WordPress is vulnerable to blind Server-Side Request Forgery in all versions up to, and including, 1.2.58. This is due to insufficient URL origin validation in the process_image_crop() method when processing avatar/banner image crop operations. The function accepts a user-controlled URL via the uwp_crop POST parameter and only validates it using esc_url() for sanitization and wp_check_filetype() for extension verification, without enforcing that the URL references a local uploads file. The URL is then…

PLUGIN Members Directory Plugin For Wp

CVE-2026-4979

MEDIUM CVSS 5.0 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-3358 - Elearning And Online Course Solution Plugin

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized private course enrollment in all versions up to, and including, 3.9.7. This is due to missing post_status validation in the `enroll_now()` and `course_enrollment()` functions. Both enrollment endpoints verify the nonce, user authentication, and whether the course is purchasable, but fail to check if the course has a `private` post_status. This makes it possible for authenticated attackers with Subscriber-level access or above to enroll in private courses by sending a crafted POST request with the…

PLUGIN Elearning And Online Course Solution

CVE-2026-3358

MEDIUM CVSS 5.4 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-3371 - Elearning And Online Course Solution Plugin

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authorization checks in the `save_course_content_order()` private method, which is called unconditionally by the `tutor_update_course_content_order` AJAX handler. While the handler's `content_parent` branch includes a `can_user_manage()` check, the `save_course_content_order()` call processes attacker-supplied `tutor_topics_lessons_sorting` JSON without any ownership or capability verification. This makes it possible for authenticated attackers with Subscriber-level access or above to detach lessons from topics, reorder course content,…

PLUGIN Elearning And Online Course Solution

CVE-2026-3371

MEDIUM CVSS 4.3 2026-04-11
Threat Entry Updated 2026-04-15

CVE-2026-4432 - Yith Woocommerce Wishlist Plugin

The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ownership in the save_title() AJAX handler before allowing wishlist renaming operations. The function only checks for a valid nonce, which is publicly exposed in the page source of the /wishlist/ page, making it possible for unauthenticated attackers to rename any wishlist belonging to any user on the site.

PLUGIN Yith Woocommerce Wishlist

CVE-2026-4432

MEDIUM CVSS 6.5 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-2305 - Addfunc Head Footer Code Plugin

The AddFunc Head & Footer Code plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `aFhfc_head_code`, `aFhfc_body_code`, and `aFhfc_footer_code` post meta values in all versions up to, and including, 2.3. This is due to the plugin outputting these meta values without any sanitization or escaping. While the plugin restricts its own metabox and save handler to administrators via `current_user_can('manage_options')`, it does not use `register_meta()` with an `auth_callback` to protect these meta keys. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web…

PLUGIN Addfunc Head Footer Code

CVE-2026-2305

MEDIUM CVSS 6.4 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-4305 - Royal Backup Reset Plugin

The Royal WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpr_pending_template' parameter in all versions up to, and including, 1.0.16 due to insufficient input validation. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.

PLUGIN Royal Backup Reset

CVE-2026-4305

MEDIUM CVSS 6.1 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-4664 - Customer Reviews Woocommerce Plugin

The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.103.0. This is due to the `create_review_permissions_check()` function comparing the user-supplied `key` parameter against the order's `ivole_secret_key` meta value using strict equality (`===`), without verifying that the stored key is non-empty. For orders where no review reminder email has been sent, the `ivole_secret_key` meta is not set, causing `get_meta()` to return an empty string. An attacker can supply `key: ""` to match this empty value and bypass the permission check.…

PLUGIN Customer Reviews Woocommerce

CVE-2026-4664

MEDIUM CVSS 5.3 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-4977 - Members Directory Plugin

The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress is vulnerable to Improper Access Control in all versions up to, and including, 1.2.58 This is due to insufficient field-level permission validation in the upload_file_remove() AJAX handler where the $htmlvar parameter is not validated against a whitelist of allowed fields or checked against the field's for_admin_use property. This makes it possible for authenticated attackers, with subscriber-level access and above, to clear or reset any restricted usermeta column for their own user record, including fields…

PLUGIN Members Directory

CVE-2026-4977

MEDIUM CVSS 4.3 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-4057 - Download Manager Plugin

The Download Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `makeMediaPublic()` and `makeMediaPrivate()` functions in all versions up to, and including, 3.3.51. This is due to the functions only checking for `edit_posts` capability without verifying post ownership via `current_user_can('edit_post', $id)`, and the destructive operations executing before the admin-level check in `mediaAccessControl()`. This makes it possible for authenticated attackers, with Contributor-level access and above, to strip all protection metadata (password, access restrictions, private flag) from any media file they do…

PLUGIN Download Manager

CVE-2026-4057

MEDIUM CVSS 4.3 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-1263 - Webling Plugin

The Webling plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 3.9.0 due to insufficient input sanitization, insufficient output escaping, and missing capabilities checks in the 'webling_admin_save_form' and 'webling_admin_save_memberlist' functions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject Webling forms and memberlists with arbitrary web scripts that will execute whenever an administrator views the related form or memberlist area of the WordPress admin.

PLUGIN Webling

CVE-2026-1263

MEDIUM CVSS 6.4 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-2712 - Wp Optimize Plugin

The WP-Optimize plugin for WordPress is vulnerable to unauthorized access of functionality due to missing capability checks in the `receive_heartbeat()` function in `includes/class-wp-optimize-heartbeat.php` in all versions up to, and including, 4.5.0. This is due to the Heartbeat handler directly invoking `Updraft_Smush_Manager_Commands` methods without verifying user capabilities, nonce tokens, or the allowed commands whitelist that the normal AJAX handler (`updraft_smush_ajax`) enforces. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke admin-only Smush operations including reading log files (`get_smush_logs`), deleting all backup images (`clean_all_backup_images`), triggering bulk image…

PLUGIN Wp Optimize

CVE-2026-2712

MEDIUM CVSS 5.4 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-1924 - Aruba Hispeed Cache Plugin

The Aruba HiSpeed Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.4. This is due to missing nonce verification on the `ahsc_ajax_reset_options()` function. This makes it possible for unauthenticated attackers to reset all plugin settings to their default values via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Aruba Hispeed Cache

CVE-2026-1924

MEDIUM CVSS 4.3 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-3005 - List Category Posts Plugin

The List category posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'catlist' shortcode in all versions up to, and including, 0.94.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN List Category Posts

CVE-2026-3005

MEDIUM CVSS 6.4 2026-04-09
Scroll to top