Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,032
Critical923
High3,046
Medium10,863
Reset
Showing 2601-2620 of 15032 records
Threat Entry Updated 2026-01-20

CVE-2025-64273 - WordPress Core

Missing Authorization vulnerability in GetResponse Email marketing for WordPress by GetResponse Official getresponse-official allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Email marketing for WordPress by GetResponse Official: from n/a through

CORE WordPress Core

CVE-2025-64273

HIGH CVSS 7.5 2025-12-18
Threat Entry Updated 2026-01-20

CVE-2025-64272 - WordPress Core

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in GetResponse Email marketing for WordPress by GetResponse Official getresponse-official allows Retrieve Embedded Sensitive Data.This issue affects Email marketing for WordPress by GetResponse Official: from n/a through

CORE WordPress Core

CVE-2025-64272

MEDIUM CVSS 6.5 2025-12-18
Threat Entry Updated 2026-01-20

CVE-2025-64231 - Contact Form 7 Plugin

Unrestricted Upload of File with Dangerous Type vulnerability in RedefiningTheWeb WordPress Contact Form 7 PDF, Google Sheet & Database rtwwcfp-wordpress-contact-form-7-pdf allows Using Malicious Files.This issue affects WordPress Contact Form 7 PDF, Google Sheet & Database: from n/a through

PLUGIN Contact Form 7

CVE-2025-64231

CRITICAL CVSS 9.8 2025-12-18
Threat Entry Updated 2025-12-18

CVE-2025-12976 - Events Manager Plugin

The Events Manager – Calendar, Bookings, Tickets, and more! plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'events_list_grouped' shortcode in all versions up to, and including, 7.2.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Events Manager

CVE-2025-12976

MEDIUM CVSS 6.4 2025-12-18
Threat Entry Updated 2025-12-18

CVE-2025-13498 - Download Manager Plugin

The Download Manager plugin for WordPress is vulnerable to unauthorized access of sensitive information in all versions up to, and including, 3.3.32. This is due to missing authorization and capability checks on the `wpdm_media_access` AJAX action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve passwords and access control settings for protected media attachments, which can then be used to bypass the intended media protection and download restricted files.

PLUGIN Download Manager

CVE-2025-13498

MEDIUM CVSS 4.3 2025-12-18
Threat Entry Updated 2025-12-18

CVE-2025-12885 - Powerpoint And Excel Files Plugin

The Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the sanitize_pdf_src function regex bypass in all versions up to, and including, 2.7.10 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Powerpoint And Excel Files

CVE-2025-12885

MEDIUM CVSS 6.4 2025-12-18
Threat Entry Updated 2025-12-18

CVE-2025-13537 - Free Wordpress Website Builder Plugin

The Live Composer – Free WordPress Website Builder plugin for WordPress is vulnerable to multiple Stored Cross-Site Scripting vulnerabilities via DOM manipulation in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Free Wordpress Website Builder

CVE-2025-13537

MEDIUM CVSS 6.4 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-14081 - Ultimate Member Plugin

The Ultimate Member plugin for WordPress is vulnerable to Profile Privacy Setting Bypass in all versions up to, and including, 2.11.0. This is due to a flaw in the secure fields mechanism where field keys are stored in the allowed fields list before the `required_perm` check is applied during rendering. This makes it possible for authenticated attackers with Subscriber-level access to modify their profile privacy settings (e.g., setting profile to "Only me") via direct parameter manipulation, even when the administrator has explicitly disabled the option for their role.

PLUGIN Ultimate Member

CVE-2025-14081

MEDIUM CVSS 4.3 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-13217 - Ultimate Member Plugin

The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the YouTube Video 'value' field in all versions up to, and including, 2.11.0. This is due to insufficient input sanitization and output escaping on user-supplied YouTube video URLs in the `um_profile_field_filter_hook__youtube_video()` function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that execute whenever a user accesses the injected user's profile page.

PLUGIN Ultimate Member

CVE-2025-13217

MEDIUM CVSS 6.4 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-14399 - Download Plugins And Themes In Zip From Dashboard

The Download Plugins and Themes in ZIP from Dashboard plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.6. This is due to missing or incorrect nonce validation on the download_plugin_bulk and download_theme_bulk functions. This makes it possible for unauthenticated attackers to archive all the sites plugins and themes and place them in the `wp-content/uploads/` directory via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Download Plugins And Themes In Zip From Dashboard

CVE-2025-14399

MEDIUM CVSS 4.3 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-12496 - Zephyr Project Manager Plugin

The Zephyr Project Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.3.203 via the `file` parameter. This makes it possible for authenticated attackers, with Custom-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. On a servers that have `allow_url_fopen` enabled, this issue allows for Server-Side Request Forgery

PLUGIN Zephyr Project Manager

CVE-2025-12496

MEDIUM CVSS 4.9 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-14061 - Gdpr Cookie Consent Plugin

The Cookie Banner, Cookie Consent, Consent Log, Cookie Scanner, Script Blocker (for GDPR, CCPA & ePrivacy) : WP Cookie Consent plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the gdpr_delete_policy_data function in all versions up to, and including, 4.0.7. This makes it possible for unauthenticated attackers to permanently delete arbitrary posts, pages, attachments, and other post types by ID.

PLUGIN Gdpr Cookie Consent

CVE-2025-14061

MEDIUM CVSS 5.3 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-13750 - Avif Plugin

The Converter for Media – Optimize images | Convert WebP & AVIF plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `/webp-converter/v1/regenerate-attachment` REST endpoint in all versions up to, and including, 6.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete optimized WebP/AVIF variants for arbitrary attachments.

PLUGIN Avif

CVE-2025-13750

MEDIUM CVSS 4.3 2025-12-17
Threat Entry Updated 2026-01-05

CVE-2025-11924 - Contact Form Builder That Grows With You Plugin

The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.13.2. This is due to the plugin not properly verifying that a user is authorized before the `ninja-forms-views` REST endpoints return form metadata and submission content. This makes it possible for unauthenticated attackers to read arbitrary form definitions and submission records via a leaked bearer token granted they can load any page containing the Submissions Table block. NOTE: The developer released a…

PLUGIN Contact Form Builder That Grows With You

CVE-2025-11924

HIGH CVSS 7.5 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-14154 - Buddyboss Plugin

The Better Messages – Live Chat for WordPress, BuddyPress, PeepSo, Ultimate Member, BuddyBoss plugin for WordPress is vulnerable to Stored Cross-Site Scripting via guest display name in all versions up to, and including, 2.10.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Buddyboss

CVE-2025-14154

MEDIUM CVSS 6.1 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-13880 - Wp Social Reviews Plugin

The WP Social Ninja – Embed Social Feeds, Customer Reviews, Chat Widgets (Google Reviews, YouTube Feed, Photo Feeds, and More) plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability check on the getAdvanceSettings and saveAdvanceSettings functions in all versions up to, and including, 4.0.1. This makes it possible for unauthenticated attackers to view and modify plugin's advanced settings.

PLUGIN Wp Social Reviews

CVE-2025-13880

MEDIUM CVSS 6.5 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-14385 - Wp Recipe Maker Plugin

The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'name' parameter in all versions up to, and including, 10.2.3 due to insufficient input sanitization and output escaping on user-supplied attributes in the wprm-recipe-roundup-item shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wp Recipe Maker

CVE-2025-14385

MEDIUM CVSS 6.4 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-13861 - Html Forms Plugin

The HTML Forms – Simple WordPress Forms Plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in all versions up to and including 1.6.0 due to insufficient sanitization of fabricated file upload field metadata before displaying it in the WordPress admin dashboard. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute whenever an administrator accesses the form submissions page.

PLUGIN Html Forms

CVE-2025-13861

MEDIUM CVSS 6.1 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-13977 - Essential Addons For Elementor Lite Plugin

The Essential Addons for Elementor – Popular Elementor Templates & Widgets plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple attack vectors in all versions up to, and including, 6.5.3. This is due to insufficient input sanitization and output escaping in the Event Calendar widget's custom attributes handling and the Image Masking module's element ID rendering. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Essential Addons For Elementor Lite

CVE-2025-13977

MEDIUM CVSS 6.4 2025-12-17
Threat Entry Updated 2025-12-18

CVE-2025-11369 - Essential Blocks Plugin

The Gutenberg Essential Blocks – Page Builder for Gutenberg Blocks & Patterns plugin for WordPress is vulnerable to unauthorized access of data due to a missing or incorrect capability checks on the get_instagram_access_token_callback, google_map_api_key_save_callback and get_siteinfo functions in all versions up to, and including, 5.7.2. This makes it possible for authenticated attackers, with Author-level access and above, to view API keys configured for the external services.

PLUGIN Essential Blocks

CVE-2025-11369

MEDIUM CVSS 4.3 2025-12-17
Scroll to top