Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total10,857
Critical0
High0
Medium10,857
Reset
Showing 1421-1440 of 10857 records
Threat Entry Updated 2026-01-13

CVE-2025-14782 - Custom Form Builder Plugin

The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 1.49.1 via the 'listen_for_csv_export' function. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with access to the Forminator dashboard, to export sensitive form submission data including personally identifiable information.

PLUGIN Custom Form Builder

CVE-2025-14782

MEDIUM CVSS 5.3 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-14720 - Amelia Plugin

The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to unauthorized access due to missing capability checks on multiple AJAX actions in all versions up to, and including, 1.2.38. This makes it possible for unauthenticated attackers to mark payments as refunded, trigger sending of queued notifications (emails/SMS/WhatsApp), and access debug information among other things.

PLUGIN Amelia

CVE-2025-14720

MEDIUM CVSS 5.3 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-14718 - Schedule Post Changes With Publishpress Future Plugin

The Schedule Post Changes With PublishPress Future plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 4.9.3. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with Contributor-level access and above, to create, update, delete, and publish malicious workflows that may automatically delete any post upon publication or update, including posts created by administrators.

PLUGIN Schedule Post Changes With Publishpress Future

CVE-2025-14718

MEDIUM CVSS 5.4 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-14574 - Wedocs Plugin

The weDocs plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.15 via the `/wp-json/wp/v2/docs/settings` REST API endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including third party services API keys.

PLUGIN Wedocs

CVE-2025-14574

MEDIUM CVSS 5.3 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-14803 - Before 9 Plugin

The NEX-Forms WordPress plugin before 9.1.8 does not sanitise and escape some of its settings. The NEX-Forms WordPress plugin before 9.1.8 can be configured in such a way that could allow subscribers to perform Stored Cross-Site Scripting.

PLUGIN Before 9

CVE-2025-14803

MEDIUM CVSS 6.8 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-13749 - Defer Plugin

The Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.4.0. This is due to missing nonce validation on the "wbcr_upm_change_flag" function. This makes it possible for unauthenticated attackers to disable plugin/theme update notifications via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Defer

CVE-2025-13749

MEDIUM CVSS 4.3 2026-01-09
Threat Entry Updated 2026-01-13

CVE-2025-14886 - Woocommerce For Japan Plugin

The Japanized for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `order` REST API endpoint in all versions up to, and including, 2.7.17. This makes it possible for unauthenticated attackers to mark any WooCommerce order as processed/completed.

PLUGIN Woocommerce For Japan

CVE-2025-14886

MEDIUM CVSS 5.3 2026-01-09
Threat Entry Updated 2026-01-22

CVE-2026-0733 - Online Course Registration System Plugin

A vulnerability was determined in PHPGurukul Online Course Registration System up to 3.1. This impacts an unknown function of the file /onlinecourse/admin/manage-students.php. This manipulation of the argument id/cid causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

PLUGIN Online Course Registration System

CVE-2026-0733

MEDIUM CVSS 5.3 2026-01-09
Threat Entry Updated 2026-01-14

CVE-2026-0732 - DI-8200G Plugin

A vulnerability was found in D-Link DI-8200G 17.12.20A1. This affects an unknown function of the file /upgrade_filter.asp. The manipulation of the argument path results in command injection. The attack may be performed from remote. The exploit has been made public and could be used.

PLUGIN DI-8200G

CVE-2026-0732

MEDIUM CVSS 5.3 2026-01-09
Threat Entry Updated 2026-01-29

CVE-2026-0731 - WA1200 Plugin

A vulnerability has been found in TOTOLINK WA1200 5.9c.2914. The impacted element is an unknown function of the file cstecgi.cgi of the component HTTP Request Handler. The manipulation leads to null pointer dereference. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

PLUGIN WA1200

CVE-2026-0731

MEDIUM CVSS 5.5 2026-01-08
Threat Entry Updated 2026-01-22

CVE-2026-0729 - Intern Membership Management System Plugin

A vulnerability was detected in code-projects Intern Membership Management System 1.0. Impacted is an unknown function of the file /intern/admin/add_activity.php. Performing a manipulation of the argument Title results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used.

PLUGIN Intern Membership Management System

CVE-2026-0729

MEDIUM CVSS 5.1 2026-01-08
Threat Entry Updated 2026-01-22

CVE-2026-0730 - Staff Leave Management System Plugin

A flaw has been found in PHPGurukul Staff Leave Management System 1.0. The affected element is the function ADD_STAFF/UPDATE_STAFF of the file /staffleave/slms/slms/adminviews.py of the component SVG File Handler. Executing a manipulation of the argument profile_pic can lead to cross site scripting. The attack can be executed remotely. The exploit has been published and may be used.

PLUGIN Staff Leave Management System

CVE-2026-0730

MEDIUM CVSS 4.8 2026-01-08
Threat Entry Updated 2026-02-02

CVE-2026-22588 - Spree Plugin

Spree is an open source e-commerce solution built with Ruby on Rails. Prior to versions 4.10.2, 5.0.7, 5.1.9, and 5.2.5, an Authenticated Insecure Direct Object Reference (IDOR) vulnerability was identified that allows an authenticated user to retrieve other users’ address information by modifying an existing order. By editing an order they legitimately own and manipulating address identifiers in the request, the backend server accepts and processes references to addresses belonging to other users, subsequently associating those addresses with the attacker’s order and returning them in the response. This issue has…

PLUGIN Spree

CVE-2026-22588

MEDIUM CVSS 6.5 2026-01-08
Threat Entry Updated 2026-01-22

CVE-2026-0728 - Intern Membership Management System Plugin

A security vulnerability has been detected in code-projects Intern Membership Management System 1.0. This issue affects some unknown processing of the file /intern/admin/delete_admin.php. Such manipulation of the argument admin_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

PLUGIN Intern Membership Management System

CVE-2026-0728

MEDIUM CVSS 5.1 2026-01-08
Threat Entry Updated 2026-02-02

CVE-2026-21860 - Werkzeug Plugin

Werkzeug is a comprehensive WSGI web application library. Prior to version 3.1.5, Werkzeug's safe_join function allows path segments with Windows device names that have file extensions or trailing spaces. On Windows, there are special device names such as CON, AUX, etc that are implicitly present and readable in every directory. Windows still accepts them with any file extension, such as CON.txt, or trailing spaces such as CON. This issue has been patched in version 3.1.5.

PLUGIN Werkzeug

CVE-2026-21860

MEDIUM CVSS 6.3 2026-01-08
Threat Entry Updated 2026-02-02

CVE-2026-22253 - Soft Serve Plugin

Soft Serve is a self-hostable Git server for the command line. Prior to version 0.11.2, an authorization bypass in the LFS lock deletion endpoint allows any authenticated user with repository write access to delete locks owned by other users by setting the force flag. The vulnerable code path processes force deletions before retrieving user context, bypassing ownership validation entirely. This issue has been patched in version 0.11.2.

PLUGIN Soft Serve

CVE-2026-22253

MEDIUM CVSS 5.4 2026-01-08
Threat Entry Updated 2026-01-13

CVE-2026-22587 - DevonWay Plugin

Ideagen DevonWay contains a stored cross site scripting vulnerability. A remote, authenticated attacker could craft a payload in the 'Reports' page that executes when another user views the report. Fixed in 2.62.4 and 2.62 LTS.

PLUGIN DevonWay

CVE-2026-22587

MEDIUM CVSS 4.8 2026-01-08
Threat Entry Updated 2026-02-05

CVE-2026-22233 - eCASE Audit Plugin

OPEXUS eCASE Audit allows an authenticated attacker to save JavaScript as a comment in the "Estimated Staff Hours" field. The JavaScript is executed whenever another user visits the Project Cost tab. Fixed in OPEXUS eCASE Audit 11.14.2.0.

PLUGIN eCASE Audit

CVE-2026-22233

MEDIUM CVSS 4.8 2026-01-08
Threat Entry Updated 2026-02-05

CVE-2026-22232 - eCASE Audit Plugin

OPEXUS eCASE Audit allows an authenticated attacker to save JavaScript in the "A or SIC Number" field within the Project Setup functionality. The JavaScript is executed whenever another user views the project. Fixed in OPEXUS eCASE Audit 11.14.2.0.

PLUGIN eCASE Audit

CVE-2026-22232

MEDIUM CVSS 4.8 2026-01-08
Threat Entry Updated 2026-02-02

CVE-2026-21896 - Kirby Plugin

Kirby is an open-source content management system. From versions 5.0.0 to 5.2.1, Kirby is missing permission checks in the content changes API. This vulnerability affects all Kirby sites where user permissions are configured to prevent specific role(s) from performing write actions, specifically by disabling the update permission with the intent to prevent modifications to site content. This vulnerability does not affect those who have not altered the deviated from default user permissions. This issue has been patched in version 5.2.2.

PLUGIN Kirby

CVE-2026-21896

MEDIUM CVSS 5.8 2026-01-08
Scroll to top