Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 3021-3040 of 15036 records
Threat Entry Updated 2025-11-25

CVE-2025-13136 - Gsheetconnector For Ninja Forms Plugin

The GSheetConnector For Ninja Forms plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'njform-google-sheet-config ' page in all versions up to, and including, 2.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve information about the system.

PLUGIN Gsheetconnector For Ninja Forms

CVE-2025-13136

MEDIUM CVSS 4.3 2025-11-22
Threat Entry Updated 2025-11-25

CVE-2025-13384 - Cp Contact Form With Paypal Plugin

The CP Contact Form with PayPal plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.56. This is due to the plugin exposing an unauthenticated IPN-like endpoint (via the 'cp_contactformpp_ipncheck' query parameter) that processes payment confirmations without any authentication, nonce verification, or PayPal IPN signature validation. This makes it possible for unauthenticated attackers to mark form submissions as paid without making actual payments by sending forged payment notification requests with arbitrary POST data (payment_status, txn_id, payer_email).

PLUGIN Cp Contact Form With Paypal

CVE-2025-13384

HIGH CVSS 7.5 2025-11-22
Threat Entry Updated 2025-11-25

CVE-2025-13317 - Appointment Booking Calendar Plugin

The Appointment Booking Calendar plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.3.96. This is due to the plugin exposing an unauthenticated booking processing endpoint (cpabc_appointments_check_IPN_verification) that trusts attacker-supplied payment notifications without verifying their origin, authenticity, or requiring proper authorization checks. This makes it possible for unauthenticated attackers to arbitrarily confirm bookings and insert them into the live calendar via the 'cpabc_ipncheck' parameter, triggering administrative and customer notification emails and disrupting operations.

PLUGIN Appointment Booking Calendar

CVE-2025-13317

MEDIUM CVSS 5.3 2025-11-22
Threat Entry Updated 2025-12-04

CVE-2025-12877 - Idonate Plugin

The IDonate – Blood Donation, Request And Donor Management System plugin for WordPress is vulnerable to unauthorized modification od data due to a missing capability check on the panding_blood_request_action() function in all versions up to, and including, 2.1.15. This makes it possible for unauthenticated attackers to delete arbitrary posts.

PLUGIN Idonate

CVE-2025-12877

MEDIUM CVSS 5.3 2025-11-22
Threat Entry Updated 2025-11-25

CVE-2025-12752 - Subscriptions Memberships For Paypal Plugin

The Subscriptions & Memberships for PayPal plugin for WordPress is vulnerable to fake payment creation in all versions up to, and including, 1.1.7. This is due to the plugin not properly verifying the authenticity of an IPN request. This makes it possible for unauthenticated attackers to create fake payment entries that have not actually occurred.

PLUGIN Subscriptions Memberships For Paypal

CVE-2025-12752

MEDIUM CVSS 5.3 2025-11-22
Threat Entry Updated 2025-11-25

CVE-2025-11186 - Cookie Notice Plugin

The Cookie Notice & Compliance for GDPR / CCPA plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's cookies_accepted shortcode in all versions up to, and including, 2.5.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Cookie Notice

CVE-2025-11186

MEDIUM CVSS 6.4 2025-11-22
Threat Entry Updated 2025-11-25

CVE-2025-11087 - Zegen Core Plugin

The Zegen Core plugin for WordPress is vulnerable to Cross-Site Request Forgery to Arbitrary File Upload in versions up to, and including, 2.0.1. This is due to missing nonce validation and missing file type validation in the '/custom-font-code/custom-fonts-uploads.php' file. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Zegen Core

CVE-2025-11087

HIGH CVSS 8.8 2025-11-21
Threat Entry Updated 2025-11-25

CVE-2025-12973 - S2b Ai Assistant Plugin

The S2B AI Assistant – ChatBot, ChatGPT, OpenAI, Content & Image Generator plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the storeFile() function in all versions up to, and including, 1.7.8. This makes it possible for authenticated attackers, with Editor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN S2b Ai Assistant

CVE-2025-12973

HIGH CVSS 7.2 2025-11-21
Threat Entry Updated 2025-11-25

CVE-2025-12747 - Tainacan Plugin

The Tainacan plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.0 via uploaded files marked as private being exposed in wp-content without adequate protection. This makes it possible for unauthenticated attackers to extract potentially sensitive information from files that have been marked as private.

PLUGIN Tainacan

CVE-2025-12747

MEDIUM CVSS 5.3 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-11127 - Mstoreapp Mobile App Plugin

The Mstoreapp Mobile App WordPress plugin through 2.08 and Mstoreapp Mobile Multivendor through 9.0.1 do not properly verify users identify when using an AJAX action, allowing unauthenticated users to retrieve a valid session for arbitrary users by knowing their email address.

PLUGIN Mstoreapp Mobile App

CVE-2025-11127

CRITICAL CVSS 9.8 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-12935 - And Crm Solution Plugin

The FluentCRM – Email Newsletter, Automation, Email Marketing, Email Campaigns, Optins, Leads, and CRM Solution plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fluentcrm_content' shortcode in all versions up to, and including, 2.9.84 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN And Crm Solution

CVE-2025-12935

MEDIUM CVSS 6.4 2025-11-21
Threat Entry Updated 2025-11-26

CVE-2025-10054 - Wsdesk Plugin

The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'eh_crm_remove_agent' function in all versions up to, and including, 3.3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to remove the role and capabilities of any user with an Administrator, WSDesk Supervisor, or WSDesk Agents role.

PLUGIN Wsdesk

CVE-2025-10054

MEDIUM CVSS 5.3 2025-11-21
Threat Entry Updated 2025-11-26

CVE-2025-10039 - Wsdesk Plugin

The ELEX WordPress HelpDesk & Customer Ticketing System plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.2.9 via the 'eh_crm_ticket_single_view_client' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of all support tickets.

PLUGIN Wsdesk

CVE-2025-10039

MEDIUM CVSS 4.3 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-13138 - Wp Directory Kit Plugin

The WP Directory Kit plugin for WordPress is vulnerable to SQL Injection via the 'columns_search' parameter of the select_2_ajax() function in all versions up to, and including, 1.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Wp Directory Kit

CVE-2025-13138

HIGH CVSS 7.5 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-12964 - Magical Products Display Plugin

The Magical Products Display plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'mpdpr_title_tag' and 'mpdpr_subtitle_tag' parameters in the MPD Pricing Table widget in all versions up to, and including, 1.1.29 due to insufficient input sanitization and output escaping on user-supplied HTML tag names. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Magical Products Display

CVE-2025-12964

MEDIUM CVSS 6.4 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-12750 - And Marketing Automation Plugin

The Groundhogg — CRM, Newsletters, and Marketing Automation plugin for WordPress is vulnerable to SQL Injection via the 'term' parameter in all versions up to, and including, 4.2.6.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN And Marketing Automation

CVE-2025-12750

MEDIUM CVSS 4.9 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-12160 - Simple User Registration Plugin

The Simple User Registration plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpr_admin_msg' parameter in all versions up to, and including, 6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Simple User Registration

CVE-2025-12160

HIGH CVSS 7.2 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-12066 - Wp Delete Post Copies Plugin

The WP Delete Post Copies plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 6.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Wp Delete Post Copies

CVE-2025-12066

MEDIUM CVSS 4.4 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-13156 - For Woocommerce Plugin

The Vitepos – Point of Sale (POS) for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the insert_media_attachment() function in all versions up to, and including, 3.3.0. This is due to the save_update_category_img() function accepting user-supplied file types without validation when processing category images. This makes it possible for authenticated attackers, with subscriber level access and above, to upload arbitrary files on the affected site's server which makes remote code execution possible.

PLUGIN For Woocommerce

CVE-2025-13156

HIGH CVSS 8.8 2025-11-21
Threat Entry Updated 2025-11-21

CVE-2025-13141 - Absolute Addons For Elementor Plugin

The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Gutenberg blocks in all versions up to, and including, 3.0.0 due to insufficient input validation on user-supplied HTML tag names. This is due to the lack of a tag name whitelist allowing dangerous tags like 'script', 'iframe', and 'object' to be injected even though tag_escape() is used for sanitization. While some blocks use esc_html() for content, this can be bypassed using JavaScript encoding techniques (unquoted strings, backticks, String.fromCharCode()). This makes…

PLUGIN Absolute Addons For Elementor

CVE-2025-13141

MEDIUM CVSS 6.4 2025-11-21
Scroll to top