Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,897
Critical917
High3,023
Medium10,759
Reset
Showing 21-40 of 14897 records
Threat Entry Updated 2026-04-15

CVE-2026-2396 - List View Google Calendar Plugin

The List View Google Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the event description in all versions up to, and including, 7.4.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN List View Google Calendar

CVE-2026-2396

MEDIUM CVSS 4.4 2026-04-15
Threat Entry Updated 2026-04-15

CVE-2026-1541 - Builder Plugin

The Avada (Fusion) Builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.15.1. This is due to the plugin's `fusion_get_post_custom_field()` function failing to validate whether metadata keys are protected (underscore-prefixed). This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract protected post metadata fields that should not be publicly accessible via the Dynamic Data feature's `post_custom_field` parameter.

PLUGIN Builder

CVE-2026-1541

MEDIUM CVSS 4.3 2026-04-15
Threat Entry Updated 2026-04-15

CVE-2026-1314 - Flipbook Image Gallery Plugin

The 3D FlipBook – PDF Embedder, PDF Flipbook Viewer, Flipbook Image Gallery plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the send_post_pages_json() function in all versions up to, and including, 1.16.17. This makes it possible for unauthenticated attackers to retrieve flipbook page metadata for draft, private and password-protected flipbooks.

PLUGIN Flipbook Image Gallery

CVE-2026-1314

MEDIUM CVSS 5.3 2026-04-15
Threat Entry Updated 2026-04-14

CVE-2026-4109 - Changeset Plugin

The Eventin – Events Calendar, Event Booking, Ticket & Registration (AI Powered) plugin for WordPress is vulnerable to unauthorized access of data due to a improper capability check on the get_item_permissions_check() function in all versions up to, and including, 4.1.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read arbitrary order data including customer PII (name, email, phone) by iterating order IDs.

PLUGIN Changeset

CVE-2026-4109

MEDIUM CVSS 4.3 2026-04-14
Threat Entry Updated 2026-04-14

CVE-2026-2582 - Woocommerce Germanized Plugin

The The Germanized for WooCommerce plugin for WordPress is vulnerable to arbitrary shortcode execution via 'account_holder' parameter in all versions up to, and including, 3.20.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

PLUGIN Woocommerce Germanized

CVE-2026-2582

MEDIUM CVSS 6.5 2026-04-14
Threat Entry Updated 2026-04-14

CVE-2026-3017 - And List Category Posts Plugin

The Smart Post Show – Post Grid, Post Carousel & Slider, and List Category Posts plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.0.12 via deserialization of untrusted input in the import_shortcodes() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If…

PLUGIN And List Category Posts

CVE-2026-3017

HIGH CVSS 7.2 2026-04-14
Threat Entry Updated 2026-04-14

CVE-2026-4059 - Woolentor Addons Plugin

The ShopLentor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the woolentor_quickview_button shortcode's button_text attribute in all versions up to, and including, 3.3.5. This is due to insufficient input sanitization and missing output escaping on user-supplied shortcode attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Woolentor Addons

CVE-2026-4059

MEDIUM CVSS 6.4 2026-04-14
Threat Entry Updated 2026-04-14

CVE-2026-4479 - Wholesale Products Dynamic Pricing Management Woocommerce Plugin

The WholeSale Products Dynamic Pricing Management WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Wholesale Products Dynamic Pricing Management Woocommerce

CVE-2026-4479

MEDIUM CVSS 4.4 2026-04-14
Threat Entry Updated 2026-04-14

CVE-2026-1607 - Surbma Bookingcom Shortcode Plugin

The Surbma | Booking.com Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `surbma-bookingcom` shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Surbma Bookingcom Shortcode

CVE-2026-1607

MEDIUM CVSS 6.4 2026-04-14
Threat Entry Updated 2026-04-14

CVE-2026-6227 - Backwpup Plugin

The BackWPup plugin for WordPress is vulnerable to Local File Inclusion via the `block_name` parameter of the `/wp-json/backwpup/v1/getblock` REST endpoint in all versions up to, and including, 5.6.6 due to a non-recursive `str_replace()` sanitization of path traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to include arbitrary PHP files on the server via crafted traversal sequences (e.g., `....//`), which can be leveraged to read sensitive files such as `wp-config.php` or achieve remote code execution in certain configurations. Administrators have the ability to grant individual…

PLUGIN Backwpup

CVE-2026-6227

HIGH CVSS 7.2 2026-04-14
Threat Entry Updated 2026-04-14

CVE-2026-4388 - Form Maker Plugin

The Form Maker by 10Web plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Matrix field (Text Box input type) in form submissions in all versions up to, and including, 1.15.40. This is due to insufficient input sanitization (`sanitize_text_field` strips tags but not quotes) and missing output escaping when rendering submission data in the admin Submissions view. This makes it possible for unauthenticated attackers to inject arbitrary JavaScript through a form submission that executes in the browser of an administrator who views the submission details.

PLUGIN Form Maker

CVE-2026-4388

HIGH CVSS 7.2 2026-04-14
Threat Entry Updated 2026-04-14

CVE-2026-4365 - Learnpress Plugin

The LearnPress plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the `delete_question_answer()` function in all versions up to, and including, 4.3.2.8. The plugin exposes a `wp_rest` nonce in public frontend HTML (`lpData`) to unauthenticated visitors, and uses that nonce as the only security gate for the `lp-load-ajax` AJAX dispatcher. The `delete_question_answer` action has no capability or ownership check. This makes it possible for unauthenticated attackers to delete any quiz answer option by sending a crafted POST request with a publicly available nonce.

PLUGIN Learnpress

CVE-2026-4365

CRITICAL CVSS 9.1 2026-04-14
Threat Entry Updated 2026-04-14

CVE-2026-4352 - Jetengine Plugin

The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom Content Type (CCT) REST API search endpoint in all versions up to, and including, 3.8.6.1. This is due to the `_cct_search` parameter being interpolated directly into a SQL query string via `sprintf()` without sanitization or use of `$wpdb->prepare()`. WordPress REST API's `wp_unslash()` call on `$_GET` strips the `wp_magic_quotes()` protection, allowing single-quote-based injection. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from…

PLUGIN Jetengine

CVE-2026-4352

HIGH CVSS 7.5 2026-04-14
Threat Entry Updated 2026-04-13

CVE-2026-6203 - User Registration Plugin

The User Registration & Membership plugin for WordPress is vulnerable to Open Redirect in versions up to and including 5.1.4. This is due to insufficient validation of user-supplied URLs passed via the 'redirect_to_on_logout' GET parameter before redirecting users. The `redirect_to_on_logout` GET parameter is passed directly to WordPress's `wp_redirect()` function instead of the domain-restricted `wp_safe_redirect()`. While `esc_url_raw()` is applied to sanitize malformed URLs, it does not restrict the redirect destination to the local domain, allowing an attacker to craft a specially formed link that redirects users to potentially malicious external URLs…

PLUGIN User Registration

CVE-2026-6203

MEDIUM CVSS 6.1 2026-04-13
Threat Entry Updated 2026-04-13

CVE-2026-5809 - Wpforo Forum Plugin

The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to and including 3.0.2. This is due to a two-step logic flaw: the topic_add() and topic_edit() action handlers accept arbitrary user-supplied data[*] arrays from $_REQUEST and store them as postmeta without restricting which fields may contain array values. Because 'body' is included in the allowed topic fields list, an attacker can supply data[body][fileurl] with an arbitrary file path (e.g., wp-config.php or an absolute server path). This poisoned fileurl is persisted to the plugin's custom postmeta…

PLUGIN Wpforo Forum

CVE-2026-5809

HIGH CVSS 7.1 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-5226 - Optimize Images In Real Time Plugin

The Optimole – Optimize Images in Real Time plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URL paths in versions up to, and including, 4.2.3 This is due to insufficient output escaping on user-supplied URL paths in the get_current_url() function, which are inserted into JavaScript code via str_replace() without proper JavaScript context escaping in the replace_content() function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on…

PLUGIN Optimize Images In Real Time

CVE-2026-5226

MEDIUM CVSS 6.1 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-5144 - Bp Groupblog Plugin

The BuddyPress Groupblog plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.9.3. This is due to the group blog settings handler accepting the `groupblog-blogid`, `default-member`, and `groupblog-silent-add` parameters from user input without proper authorization checks. The `groupblog-blogid` parameter allows any group admin (including Subscribers who create their own group) to associate their group with any blog on the Multisite network, including the main site (blog ID 1). The `default-member` parameter accepts any WordPress role, including `administrator`, without validation against a whitelist. When combined…

PLUGIN Bp Groupblog

CVE-2026-5144

HIGH CVSS 8.8 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-5217 - Optimole Wp Plugin

The Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 4.2.2. This is due to insufficient input sanitization and output escaping on the user-supplied 's' parameter (srcset descriptor) in the unauthenticated /wp-json/optimole/v1/optimizations REST endpoint. The endpoint validates requests using an HMAC signature and timestamp, but these values are exposed directly in the frontend HTML making them accessible to any visitor. The plugin uses sanitize_text_field() on the…

PLUGIN Optimole Wp

CVE-2026-5217

HIGH CVSS 7.2 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-5207 - Lifterlms Plugin

The LifterLMS plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter in all versions up to, and including, 9.2.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Instructor-level access and above who have the edit_post capability on the quiz, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Lifterlms

CVE-2026-5207

MEDIUM CVSS 6.5 2026-04-11
Scroll to top