Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total10,857
Critical0
High0
Medium10,857
Reset
Showing 1381-1400 of 10857 records
Threat Entry Updated 2026-01-16

CVE-2026-22024 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the cryptography_encrypt() function allocates multiple buffers for HTTP requests and JSON parsing that are never freed on any code path. Each call leaks approximately 400 bytes of memory. Sustained traffic can gradually exhaust available memory. This issue has been patched in version 1.4.3.

PLUGIN CryptoLib

CVE-2026-22024

MEDIUM CVSS 6.3 2026-01-10
Threat Entry Updated 2026-01-15

CVE-2026-22027 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, the convert_hexstring_to_byte_array() function in the MariaDB SA interface writes decoded bytes into a caller-provided buffer without any capacity check. When importing SA fields from the database (e.g., IV, ARSN, ABM), a malformed or oversized hex string in the database can overflow the destination buffer, corrupting adjacent heap memory. This issue has been patched…

PLUGIN CryptoLib

CVE-2026-22027

MEDIUM CVSS 5.7 2026-01-10
Threat Entry Updated 2026-01-15

CVE-2026-21899 - CryptoLib Plugin

CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. Prior to version 1.4.3, in base64urlDecode, padding-stripping dereferences input[inputLen - 1] before checking that inputLen > 0 or that input != NULL. For inputLen == 0, this becomes an OOB read at input[-1], potentially crashing the process. If input == NULL and inputLen == 0, it dereferences NULL - 1. This issue has been patched in version…

PLUGIN CryptoLib

CVE-2026-21899

MEDIUM CVSS 4.7 2026-01-10
Threat Entry Updated 2026-01-14

CVE-2026-22198 - GestSup Plugin

GestSup versions prior to 3.2.60 contain a pre-authentication stored cross-site scripting (XSS) vulnerability in the API error logging functionality. By sending an API request with a crafted X-API-KEY header value (for example, to /api/v1/ticket.php), an unauthenticated attacker can cause attacker-controlled HTML/JavaScript to be written to log entries. When an administrator later views the affected logs in the web interface, the injected content is rendered without proper output encoding, resulting in arbitrary script execution in the administrator’s browser session.

PLUGIN GestSup

CVE-2026-22198

MEDIUM CVSS 5.1 2026-01-09
Threat Entry Updated 2026-01-22

CVE-2026-0803 - Online Course Registration System Plugin

A vulnerability was found in PHPGurukul Online Course Registration System up to 3.1. This affects an unknown part of the file /enroll.php. The manipulation of the argument studentregno/Pincode/session/department/level/course/sem results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.

PLUGIN Online Course Registration System

CVE-2026-0803

MEDIUM CVSS 5.3 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-14172 - Change Wp Page Permalinks Plugin

The WP Page Permalink Extension plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.5.4. This is due to missing authorization checks on the `cwpp_trigger_flush_rewrite_rules` function hooked to `wp_ajax_cwpp_trigger_flush_rewrite_rules`. This makes it possible for authenticated attackers, with Subscriber-level access and above, to flush the site's rewrite rules via the `action` parameter.

PLUGIN Change Wp Page Permalinks

CVE-2025-14172

MEDIUM CVSS 6.5 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13967 - Woodpecker For Wordpress Plugin

The Woodpecker for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'form_name' parameter of the [woodpecker-connector] shortcode in all versions up to, and including, 3.0.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Woodpecker For Wordpress

CVE-2025-13967

MEDIUM CVSS 6.4 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13908 - The Tooltip Plugin

The The Tooltip plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'the_tooltip' shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN The Tooltip

CVE-2025-13908

MEDIUM CVSS 6.4 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13903 - Pullquote Plugin

The PullQuote plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pullquote' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Pullquote

CVE-2025-13903

MEDIUM CVSS 6.4 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13897 - Wp Client Testimonial Plugin

The Client Testimonial Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'aft_testimonial_meta_name' custom field in the Client Information metabox in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the injected administrative page.

PLUGIN Wp Client Testimonial

CVE-2025-13897

MEDIUM CVSS 6.4 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13862 - Menu Card Plugin

The Menu Card plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `category` parameter in all versions up to, and including, 0.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Menu Card

CVE-2025-13862

MEDIUM CVSS 6.4 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13854 - Curved Text Plugin

The Curved Text plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'radius' parameter of the arctext shortcode in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Curved Text

CVE-2025-13854

MEDIUM CVSS 6.4 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13893 - Lesson Plan Book Plugin

The Lesson Plan Book plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` variable in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Lesson Plan Book

CVE-2025-13893

MEDIUM CVSS 6.1 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13892 - Mg Advancedoptions Plugin

The MG AdvancedOptions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `$_SERVER['PHP_SELF']` variable in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Mg Advancedoptions

CVE-2025-13892

MEDIUM CVSS 6.1 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13852 - Debtcom Business In A Box Plugin

The Debt.com Business in a Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'configuration' parameter of the lead_form shortcode in all versions up to, and including, 4.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Debtcom Business In A Box

CVE-2025-13852

MEDIUM CVSS 6.4 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13704 - Autogen Headers Menu Plugin

The Autogen Headers Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'head_class' parameter of the 'autogen_menu' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Autogen Headers Menu

CVE-2025-13704

MEDIUM CVSS 6.4 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13701 - Shabat Keeper Plugin

The Shabat Keeper plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the $_SERVER['PHP_SELF'] parameter in all versions up to, and including, 0.4.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Shabat Keeper

CVE-2025-13701

MEDIUM CVSS 6.1 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13717 - Contact Form Vcard Generator Plugin

The Contact Form vCard Generator plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wp_gvccf_check_download_request' function in all versions up to, and including, 2.4. This makes it possible for unauthenticated attackers to export sensitive Contact Form 7 submission data via the 'wp-gvc-cf-download-id' parameter, including names, phone numbers, email addresses, and messages.

PLUGIN Contact Form Vcard Generator

CVE-2025-13717

MEDIUM CVSS 5.3 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-11453 - Header And Footer Scripts Plugin

The Header and Footer Scripts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the _inpost_head_script parameter in all versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Header And Footer Scripts

CVE-2025-11453

MEDIUM CVSS 6.4 2026-01-09
Scroll to top