Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 3361-3380 of 15036 records
Threat Entry Updated 2025-11-04

CVE-2025-11724 - Em Beer Manager Plugin

The EM Beer Manager plugin for WordPress is vulnerable to arbitrary file upload leading to remote code execution in all versions up to, and including, 3.2.3. This is due to missing file type validation in the EMBM_Admin_Untappd_Import_image() function and missing authorization checks on the wp_ajax_embm-untappd-import action. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files including PHP files and execute code on the server granted they can provide a mock HTTP server that responds with specific JSON data.

PLUGIN Em Beer Manager

CVE-2025-11724

HIGH CVSS 8.8 2025-11-04
Threat Entry Updated 2025-11-04

CVE-2025-11704 - Elegance Menu Plugin

The Elegance Menu plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.9 via the 'elegance-menu' attribute of the `elegance-menu` shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

PLUGIN Elegance Menu

CVE-2025-11704

HIGH CVSS 7.5 2025-11-04
Threat Entry Updated 2025-11-04

CVE-2025-10896 - Image Hover Effects Elementor Addon Plugin

Multiple plugins for WordPress with the Jewel Theme Recommended Plugins Library are vulnerable to Unrestricted Upload of File with Dangerous Type via arbitrary plugin installation in all versions up to, and including, 1.0.2.3. This is due to missing capability checks on the '*_recommended_upgrade_plugin' function which allows arbitrary plugin URLs to be installed. This makes it possible for authenticated attackers with subscriber-level access and above to upload arbitrary plugin packages to the affected site's server via a crafted plugin URL, which may make remote code execution possible.

PLUGIN Image Hover Effects Elementor Addon

CVE-2025-10896

HIGH CVSS 8.8 2025-11-04
Threat Entry Updated 2025-11-04

CVE-2025-11008 - Ce21 Suite Plugin

The CE21 Suite plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.1 via the log file. This makes it possible for unauthenticated attackers to extract sensitive data including authentication credentials, which can be used to log in as other users as long as they have used the plugin's custom authentication feature before. This may include administrators, which makes a complete site takeover possible.

PLUGIN Ce21 Suite

CVE-2025-11008

CRITICAL CVSS 9.8 2025-11-04
Threat Entry Updated 2025-11-04

CVE-2025-12401 - Label Plugins

The Label Plugins plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.5. This is due to missing or incorrect nonce validation on the label_plugins_options() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Label Plugins

CVE-2025-12401

MEDIUM CVSS 6.1 2025-11-04
Threat Entry Updated 2025-11-04

CVE-2025-12070 - Viaads Plugin

The ViaAds plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.1. This is due to missing nonce validation on the `ViaAds_pluginHandler` function. This makes it possible for unauthenticated attackers to modify the plugin's API key and cookie consent settings via a forged request granted they can trick an administrator into performing an action such as clicking on a link.

PLUGIN Viaads

CVE-2025-12070

MEDIUM CVSS 4.3 2025-11-04
Threat Entry Updated 2025-11-04

CVE-2025-12069 - Wp Global Screen Options Plugin

The WP Global Screen Options plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.2. This is due to missing nonce validation on the `updatewpglobalscreenoptions` action handler. This makes it possible for unauthenticated attackers to modify global screen options for all users via a forged request granted they can trick an administrator into performing an action such as clicking on a link.

PLUGIN Wp Global Screen Options

CVE-2025-12069

MEDIUM CVSS 4.3 2025-11-04
Threat Entry Updated 2025-11-04

CVE-2025-11007 - Ce21 Suite Plugin

The CE21 Suite plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the wp_ajax_nopriv_ce21_single_sign_on_save_api_settings AJAX action in versions 2.2.1 to 2.3.1. This makes it possible for unauthenticated attackers to update the plugin's API settings including a secret key used for authentication. This allows unauthenticated attackers to create new admin accounts on an affected site.

PLUGIN Ce21 Suite

CVE-2025-11007

CRITICAL CVSS 9.8 2025-11-04
Threat Entry Updated 2025-11-04

CVE-2025-12324 - Tables In Wordpress Made Easy Plugin

The TablePress – Tables in WordPress made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `table` shortcode attributes in all versions up to, and including, 3.2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Tables In Wordpress Made Easy

CVE-2025-12324

MEDIUM CVSS 6.4 2025-11-04
Threat Entry Updated 2025-11-04

CVE-2025-11841 - Animation And Page Builder Blocks Plugin

The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Chart Data attributes in all versions up to, and including, 12.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Animation And Page Builder Blocks

CVE-2025-11841

MEDIUM CVSS 6.4 2025-11-04
Threat Entry Updated 2025-11-04

CVE-2025-8900 - Doccure Core Plugin

The Doccure Core plugin for WordPress is vulnerable to privilege escalation in versions up to, and excluding, 1.5.4. This is due to the plugin allowing users who are registering new accounts to set their own role or by supplying 'user_type' field. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role.

PLUGIN Doccure Core

CVE-2025-8900

CRITICAL CVSS 9.8 2025-11-03
Threat Entry Updated 2025-11-04

CVE-2025-6990 - Kallyas Theme

The kallyas theme for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.0 via the `TH_PhpCode` pagebuilder widget. This is due to the theme not restricting access to the code editor widget for non-administrators. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.

THEME Kallyas

CVE-2025-6990

HIGH CVSS 8.8 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-6988 - Kallyas Theme

The kallyas theme for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes in all versions up to, and including, 4.23.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

THEME Kallyas

CVE-2025-6988

MEDIUM CVSS 6.4 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-12171 - Restful Content Syndication Plugin

The RESTful Content Syndication plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ingest_image() function in versions 1.1.0 to 1.5.0. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. This requires the attacker have access to a defined third-party server as specified in the settings, so it is unlikely that this will be exploitable by contributor-level users, and more likely to be exploited…

PLUGIN Restful Content Syndication

CVE-2025-12171

HIGH CVSS 8.8 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11755 - Delicious Recipes Plugin

The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file uploads when importing recipes via CSV in all versions up to, and including, 1.9.0. This flaw allows an attacker with at least Contributor-level permissions to upload a malicious PHP file by providing a remote URL during a recipe import process, leading to Remote Code Execution (RCE).

PLUGIN Delicious Recipes

CVE-2025-11755

HIGH CVSS 8.8 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-6574 - Service Finder Bookings Plugin

The Service Finder Bookings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and excluding, 6.1. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

PLUGIN Service Finder Bookings

CVE-2025-6574

HIGH CVSS 8.8 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-12137 - Jc Importer Plugin

The Import WP – Export and Import CSV and XML files to WordPress plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.14.16. This is due to the plugin's REST API endpoint accepting arbitrary absolute file paths without proper validation in the 'attach_file()' function when handling 'file_local' actions. This makes it possible for authenticated attackers, with administrator-level access and above, to read arbitrary files on the server's filesystem, including sensitive configuration files and system files via the 'local_url' parameter.

PLUGIN Jc Importer

CVE-2025-12137

MEDIUM CVSS 4.9 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-11499 - Fluent Plugin

The Tablesome Table – Contact Form DB – WPForms, CF7, Gravity, Forminator, Fluent plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_featured_image_from_external_url() function in all versions up to, and including, 1.1.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible in configurations where unauthenticated users have been provided with a method for adding featured images, and the workflow trigger is created.

PLUGIN Fluent

CVE-2025-11499

CRITICAL CVSS 9.8 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-10487 - Adsense Plugin

The Advanced Ads – Ad Manager & AdSense plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.0.12 via the select_one() function. This is due to the endpoint not properly restricting access to the AJAX endpoint or limiting the functions that can be called to safe functions. This makes it possible for unauthenticated attackers to call arbitrary functions beginning with get_the_ like get_the_excerpt which can make information exposure possible.

PLUGIN Adsense

CVE-2025-10487

HIGH CVSS 7.3 2025-11-01
Threat Entry Updated 2025-11-04

CVE-2025-12090 - Meet The Team Plugin

The Employee Spotlight – Team Member Showcase & Meet the Team Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via Social URLs in all versions up to, and including, 5.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Meet The Team

CVE-2025-12090

MEDIUM CVSS 6.4 2025-11-01
Scroll to top