Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 4041-4060 of 15036 records
Threat Entry Updated 2025-08-20

CVE-2025-49382 - Allows Privilege Escalation Theme

Cross-Site Request Forgery (CSRF) vulnerability in DexignZone JobZilla - Job Board WordPress Theme allows Privilege Escalation. This issue affects JobZilla - Job Board WordPress Theme: from n/a through 2.0.

THEME Allows Privilege Escalation

CVE-2025-49382

HIGH CVSS 8.8 2025-08-20
Threat Entry Updated 2025-08-20

CVE-2025-9202 - Colormag Theme

The ColorMag theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the welcome_notice_import_handler() function in all versions up to, and including, 4.0.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the ThemeGrill Demo Importer plugin.

THEME Colormag

CVE-2025-9202

MEDIUM CVSS 4.3 2025-08-20
Threat Entry Updated 2025-08-20

CVE-2025-8618 - Woo Smart Quick View Plugin

The WPC Smart Quick View for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's woosq_btn shortcode in all versions up to, and including, 4.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Woo Smart Quick View

CVE-2025-8618

MEDIUM CVSS 6.4 2025-08-20
Threat Entry Updated 2025-08-20

CVE-2025-8289 - Wpcf7 Redirect Plugin

The Redirection for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.2.4 via deserialization of untrusted input in the delete_associated_files function. This makes it possible for unauthenticated attackers to inject a PHP Object. This vulnerability may be exploited by unauthenticated attackers when a form is present on the site with a file upload action, and doesn't affect sites with PHP version > 8. This vulnerability also requires the 'Redirection For Contact Form 7 Extension - Create Post' extension to…

PLUGIN Wpcf7 Redirect

CVE-2025-8289

HIGH CVSS 7.5 2025-08-20
Threat Entry Updated 2025-08-20

CVE-2025-8145 - Wpcf7 Redirect Plugin

The Redirection for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.2.4 via deserialization of untrusted input in the get_lead_fields function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in a Contact Form 7 plugin allows attackers to delete arbitrary files. Additionally, in certain server configurations, Remote Code Execution is possible

PLUGIN Wpcf7 Redirect

CVE-2025-8145

HIGH CVSS 8.8 2025-08-20
Threat Entry Updated 2025-08-20

CVE-2025-8141 - Wpcf7 Redirect Plugin

The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_associated_files function in all versions up to, and including, 3.2.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Wpcf7 Redirect

CVE-2025-8141

HIGH CVSS 8.8 2025-08-20
Threat Entry Updated 2025-08-19

CVE-2025-8783 - Contact Manager Plugin

The Contact Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title’ parameter in all versions up to, and including, 8.6.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Contact Manager

CVE-2025-8783

MEDIUM CVSS 4.4 2025-08-19
Threat Entry Updated 2025-08-19

CVE-2025-8567 - Nexter Blocks Plugin

The Nexter Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 4.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Nexter Blocks

CVE-2025-8567

MEDIUM CVSS 6.4 2025-08-19
Threat Entry Updated 2025-08-19

CVE-2025-8723 - Cf Image Resizing Plugin

The Cloudflare Image Resizing plugin for WordPress is vulnerable to Remote Code Execution due to missing authentication and insufficient sanitization within its hook_rest_pre_dispatch() method in all versions up to, and including, 1.5.6. This makes it possible for unauthenticated attackers to inject arbitrary PHP into the codebase, achieving remote code execution.

PLUGIN Cf Image Resizing

CVE-2025-8723

CRITICAL CVSS 9.8 2025-08-19
Threat Entry Updated 2025-08-19

CVE-2025-7670 - Jquery Archive List Widget Plugin

The JS Archive List plugin for WordPress is vulnerable to time-based SQL Injection via the build_sql_where() function in all versions up to, and including, 6.1.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Jquery Archive List Widget

CVE-2025-7670

HIGH CVSS 7.5 2025-08-19
Threat Entry Updated 2025-08-19

CVE-2025-8622 - Wp Flexible Map Plugin

The Flexible Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Flexible Maps shortcode in all versions up to, and including, 1.18.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wp Flexible Map

CVE-2025-8622

MEDIUM CVSS 6.4 2025-08-19
Threat Entry Updated 2025-08-19

CVE-2025-7654 - Funnel Builder Plugin

Multiple FunnelKit plugins are vulnerable to Sensitive Information Exposure via the wf_get_cookie shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including authentication cookies of other site users, which may make privilege escalation possible. Please note both FunnelKit – Funnel Builder for WooCommerce Checkout AND FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce are affected by this.

PLUGIN Funnel Builder

CVE-2025-7654

HIGH CVSS 8.8 2025-08-19
Threat Entry Updated 2025-08-19

CVE-2025-6758 - Real Spaces Wordpress Properties Directory Theme

The Real Spaces - WordPress Properties Directory Theme theme for WordPress is vulnerable to privilege escalation via the 'imic_agent_register' function in all versions up to, and including, 3.6. This is due to a lack of restriction in the registration role. This makes it possible for unauthenticated attackers to arbitrarily choose their role, including the Administrator role, during user registration.

THEME Real Spaces Wordpress Properties Directory Theme

CVE-2025-6758

CRITICAL CVSS 9.8 2025-08-19
Threat Entry Updated 2025-08-19

CVE-2025-8218 - Real Spaces Wordpress Properties Directory Theme

The Real Spaces - WordPress Properties Directory Theme theme for WordPress is vulnerable to privilege escalation via the 'change_role_member' parameter in all versions up to, and including, 3.5. This is due to a lack of restriction in the profile update role. This makes it possible for unauthenticated attackers to arbitrarily choose their role, including the Administrator role, during a profile update.

THEME Real Spaces Wordpress Properties Directory Theme

CVE-2025-8218

HIGH CVSS 8.8 2025-08-19
Threat Entry Updated 2025-08-19

CVE-2025-8357 - Media Library Assistant Plugin

The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file deletion in the /wp-content/uploads directory due to insufficient file path validation and user capability checking in the _process_mla_download_file function in all versions up to, and including, 3.27. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server from the /wp-content/uploads/ directory.

PLUGIN Media Library Assistant

CVE-2025-8357

MEDIUM CVSS 4.3 2025-08-19
Threat Entry Updated 2025-08-19

CVE-2025-7496 - Wpc Smart Compare For Woocommerce Plugin

The WPC Smart Compare for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via DOM elements in all versions up to, and including, 6.4.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wpc Smart Compare For Woocommerce

CVE-2025-7496

MEDIUM CVSS 6.4 2025-08-19
Threat Entry Updated 2025-08-18

CVE-2025-8878 - Wp User Avatar Plugin

The The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 4.16.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

PLUGIN Wp User Avatar

CVE-2025-8878

MEDIUM CVSS 6.5 2025-08-16
Threat Entry Updated 2025-08-18

CVE-2025-8142 - Soledad Theme

The Soledad theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 8.6.7 via the 'header_layout' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

THEME Soledad

CVE-2025-8142

HIGH CVSS 8.8 2025-08-16
Threat Entry Updated 2025-08-18

CVE-2025-8105 - The Soledad Theme

The The Soledad theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.6.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

THEME The Soledad

CVE-2025-8105

HIGH CVSS 7.3 2025-08-16
Threat Entry Updated 2025-08-18

CVE-2025-8143 - Soledad Theme

The Soledad theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pcsml_smartlists_h’ parameter in all versions up to, and including, 8.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

THEME Soledad

CVE-2025-8143

MEDIUM CVSS 6.4 2025-08-16
Scroll to top