Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 3641-3660 of 15036 records
Threat Entry Updated 2025-10-09

CVE-2025-7526 - Wp Travel Engine Plugin

The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to arbitrary file deletion (via renaming) due to insufficient file path validation in the set_user_profile_image function in all versions up to, and including, 6.6.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Wp Travel Engine

CVE-2025-7526

CRITICAL CVSS 9.8 2025-10-09
Threat Entry Updated 2025-10-09

CVE-2025-6038 - Lisfinity Wordpress Theme Plugin

The Lisfinity Core - Lisfinity Core plugin used for pebas® Lisfinity WordPress theme plugin for WordPress is vulnerable to privilege escalation via password update in all versions up to, and including, 1.4.0. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's passwords, including those of administrators.

PLUGIN Lisfinity Wordpress Theme

CVE-2025-6038

HIGH CVSS 8.8 2025-10-09
Threat Entry Updated 2025-10-09

CVE-2025-11166 - Wp Google Maps Plugin

The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in all versions up to, and including, 9.0.46. This is due to the plugin exposing state-changing REST actions through an AJAX bridge without proper CSRF token validation, and having destructive logic reachable via GET requests with no permission_callback. This makes it possible for unauthenticated attackers to force logged-in administrators to create, update, or delete markers and geometry features via CSRF attacks, and allows anonymous users to trigger mass deletion of markers via…

PLUGIN Wp Google Maps

CVE-2025-11166

MEDIUM CVSS 5.4 2025-10-09
Threat Entry Updated 2025-10-09

CVE-2025-10586 - Community Events Plugin

The Community Events plugin for WordPress is vulnerable to SQL Injection via the ‘event_venue’ parameter in all versions up to, and including, 1.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Community Events

CVE-2025-10586

CRITICAL CVSS 9.8 2025-10-09
Threat Entry Updated 2025-10-09

CVE-2025-10496 - Cookie Notice Consent Plugin

The Cookie Notice & Consent plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the uuid parameter in all versions up to, and including, 1.6.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Cookie Notice Consent

CVE-2025-10496

HIGH CVSS 7.2 2025-10-09
Threat Entry Updated 2025-10-08

CVE-2025-10649 - Welcart E Commerce Plugin

The Welcart e-Commerce plugin for WordPress is vulnerable to SQL Injection via the cookie in all versions up to, and including, 2.11.21 due to insufficient escaping on the user supplied value and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Welcart E Commerce

CVE-2025-10649

MEDIUM CVSS 6.5 2025-10-08
Threat Entry Updated 2025-10-08

CVE-2025-11171 - Chart Builder Plugin

The Chartify – WordPress Chart Plugin for WordPress is vulnerable to Missing Authentication for Critical Function in all versions up to, and including, 3.5.9. This is due to the plugin registering an unauthenticated AJAX action that dispatches to admin-class methods based on a request parameter, without any nonce or capability checks. This makes it possible for unauthenticated attackers to execute administrative functions via the wp-admin/admin-ajax.php endpoint granted they can identify callable method names.

PLUGIN Chart Builder

CVE-2025-11171

MEDIUM CVSS 5.3 2025-10-08
Threat Entry Updated 2025-10-08

CVE-2025-10635 - Find Me On Plugin

The Find Me On WordPress plugin through 2.0.9.1 does not sanitize and escape a parameter before using it in a SQL statement, allowing subscribers and above to perform SQL injection attacks

PLUGIN Find Me On

CVE-2025-10635

HIGH CVSS 7.7 2025-10-08
Threat Entry Updated 2025-10-08

CVE-2025-11204 - And User Login Plugin

The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 6.0.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. An unauthenticated attacker could utilize an injected Cross-Site Scripting via user-agent…

PLUGIN And User Login

CVE-2025-11204

HIGH CVSS 7.2 2025-10-08
Threat Entry Updated 2025-10-08

CVE-2025-10587 - Community Events Plugin

The Community Events plugin for WordPress is vulnerable to SQL Injection via the event_category parameter in all versions up to, and including, 1.5.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Community Events

CVE-2025-10587

CRITICAL CVSS 9.8 2025-10-08
Threat Entry Updated 2025-10-08

CVE-2025-10494 - Classified Listings Plugin

The Motors – Car Dealership & Classified Listings Plugin plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation when deleting profile pictures in all versions up to, and including, 1.4.89. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Classified Listings

CVE-2025-10494

HIGH CVSS 8.1 2025-10-08
Threat Entry Updated 2025-10-08

CVE-2025-10645 - Wp Reset Plugin

The WP Reset plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.05 via the WF_Licensing::log() method when debugging is enabled (default). This makes it possible for unauthenticated attackers to extract sensitive license key and site data.

PLUGIN Wp Reset

CVE-2025-10645

MEDIUM CVSS 5.3 2025-10-07
Threat Entry Updated 2025-10-08

CVE-2025-7400 - Changeset Plugin

The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a post's Featured Image custom fields in all versions up to, and including, 5.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability was partially fixed in version 5.2.2.

PLUGIN Changeset

CVE-2025-7400

MEDIUM CVSS 6.4 2025-10-07
Threat Entry Updated 2025-10-08

CVE-2025-10162 - Before 14 Does Not Validate The Path Of Files To Be Downloaded Plugin

The Admin and Customer Messages After Order for WooCommerce: OrderConvo WordPress plugin before 14 does not validate the path of files to be downloaded, which could allow unauthenticated attacker to read/download arbitrary files via a path traversal attack

PLUGIN Before 14 Does Not Validate The Path Of Files To Be Downloaded

CVE-2025-10162

HIGH CVSS 7.5 2025-10-07
Threat Entry Updated 2025-10-06

CVE-2025-9710 - Before 2 Plugin

The Responsive Lightbox & Gallery WordPress plugin before 2.5.3 does not properly handle HTML tag attributes modifications, potentially allowing unauthenticated attackers to abuse the functionality to include event handlers and conduct Stored XSS attacks.

PLUGIN Before 2

CVE-2025-9710

MEDIUM CVSS 6.3 2025-10-06
Threat Entry Updated 2025-10-06

CVE-2025-9703 - Before 2 Plugin

The Ultimate Addons for Elementor (Formerly Elementor Header & Footer Builder) WordPress plugin before 2.5.0 does not sanitize SVG file contents when uploaded through the xmlrpc.php endpoint using base64 encode, leading to a Cross-Site Scripting vulnerability.

PLUGIN Before 2

CVE-2025-9703

MEDIUM CVSS 4.3 2025-10-06
Threat Entry Updated 2025-10-06

CVE-2025-9952 - Text To Speech Ai Audio Player To Convert Content Into Audio Plugin

The Trinity Audio – Text to Speech AI audio player to convert content into audio plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'range-date' parameter in all versions up to, and including, 5.20.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Text To Speech Ai Audio Player To Convert Content Into Audio

CVE-2025-9952

MEDIUM CVSS 6.1 2025-10-04
Threat Entry Updated 2025-10-06

CVE-2025-9886 - Trinity Audio Plugin

The Trinity Audio – Text to Speech AI audio player to convert content into audio plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.20.2. This is due to missing or incorrect nonce validation in the '/admin/inc/post-management.php' file. This makes it possible for unauthenticated attackers to activate/deactivate posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Trinity Audio

CVE-2025-9886

MEDIUM CVSS 4.3 2025-10-04
Threat Entry Updated 2025-10-06

CVE-2025-10383 - Contest Gallery Plugin

The Contest Gallery – Upload, Vote & Sell with PayPal and Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple form field parameters in all versions up to, and including, 27.0.2. This is due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with author-level access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Contest Gallery

CVE-2025-10383

MEDIUM CVSS 6.4 2025-10-04
Threat Entry Updated 2025-10-06

CVE-2025-9485 - Miniorange Login With Eve Online Google Facebook Plugin

The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature in versions up to, and including, 6.26.12. This is due to the plugin performing unsafe JWT token processing without verification or validation in the `get_resource_owner_from_id_token` function. This makes it possible for unauthenticated attackers to bypass authentication and gain access to any existing user account - including administrators in certain configurations - or to create arbitrary subscriber-level accounts.

PLUGIN Miniorange Login With Eve Online Google Facebook

CVE-2025-9485

CRITICAL CVSS 9.8 2025-10-04
Scroll to top