Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,924
Critical919
High3,029
Medium10,777
Reset
Showing 401-420 of 14924 records
Threat Entry Updated 2026-03-11

CVE-2026-1454 - Lead Form Builder Plugin

The Responsive Contact Form Builder & Lead Generation Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0.1 via form field submissions. This is due to insufficient input sanitization in the lfb_lead_sanitize() function which omits certain field types from its sanitization whitelist, combined with an overly permissive wp_kses() filter at output time that allows onclick attributes on anchor tags. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator views the lead…

PLUGIN Lead Form Builder

CVE-2026-1454

HIGH CVSS 7.2 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3903 - And Backup Multiple Websites Plugin

The Modular DS: Monitor, update, and backup multiple websites plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.1. This is due to missing nonce validation on the postConfirmOauth() function. This makes it possible for unauthenticated attackers to disconnect the plugin's OAuth/SSO connection via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN And Backup Multiple Websites

CVE-2026-3903

MEDIUM CVSS 4.3 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-1708 - Simply Schedule Appointments Plugin

The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to blind SQL Injection in all versions up to, and including, 1.6.9.27. This is due to the `db_where_conditions` method in the `TD_DB_Model` class failing to prevent the `append_where_sql` parameter from being passed through JSON request bodies, while only checking for its presence in the `$_REQUEST` superglobal. This makes it possible for unauthenticated attackers to append arbitrary SQL commands to queries and extract sensitive information from the database via the `append_where_sql` parameter in JSON payloads granted…

PLUGIN Simply Schedule Appointments

CVE-2026-1708

HIGH CVSS 7.5 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2918 - Happy Addons For Elementor Plugin

The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_condition_update` AJAX action. This is due to the `validate_reqeust()` method using `current_user_can('edit_posts', $template_id)` instead of `current_user_can('edit_post', $template_id)` — failing to perform object-level authorization. Additionally, the `ha_get_current_condition` AJAX action lacks a capability check. This makes it possible for authenticated attackers, with Contributor-level access and above, to modify the display conditions of any published `ha_library` template. Because the `cond_to_html()` renderer outputs condition values into HTML attributes without…

PLUGIN Happy Addons For Elementor

CVE-2026-2918

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2917 - Happy Addons For Elementor Plugin

The Happy Addons for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.21.0 via the `ha_duplicate_thing` admin action handler. This is due to the `can_clone()` method only checking `current_user_can('edit_posts')` (a general capability) without performing object-level authorization such as `current_user_can('edit_post', $post_id)`, and the nonce being tied to the generic action name `ha_duplicate_thing` rather than to a specific post ID. This makes it possible for authenticated attackers, with Contributor-level access and above, to clone any published post, page, or custom post type…

PLUGIN Happy Addons For Elementor

CVE-2026-2917

MEDIUM CVSS 5.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3534 - Astra Plugin

The Astra theme for WordPress is vulnerable to Stored Cross-Site Scripting via the `ast-page-background-meta` and `ast-content-background-meta` post meta fields in all versions up to, and including, 4.12.3. This is due to insufficient input sanitization on meta registration and missing output escaping in the `astra_get_responsive_background_obj()` function for four CSS-context sub-properties (`background-color`, `background-image`, `overlay-color`, `overlay-gradient`). This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Astra

CVE-2026-3534

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-04-15

CVE-2026-2631 - Datalogics Ecommerce Delivery Plugin

The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication in a protected endpoint that allows users to perform arbitrary WordPress `update_option()` operations. Attackers can use this to enable registartion and to set the default role as Administrator.

PLUGIN Datalogics Ecommerce Delivery

CVE-2026-2631

CRITICAL CVSS 9.8 2026-03-11
Threat Entry Updated 2026-04-15

CVE-2026-2626 - Divi Booster Plugin

The divi-booster WordPress plugin before 5.0.2 does not have authorization and CSRF checks in one of its fixing function, allowing unauthenticated users to modify stored divi-booster WordPress plugin before 5.0.2 options. Furthermore, due to the use of unserialize() on the data, this could be further exploited when combined with a PHP gadget chain to achieve PHP Object Injection

PLUGIN Divi Booster

CVE-2026-2626

HIGH CVSS 8.1 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3222 - Wp Google Map Plugin

The WP Maps plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'location_id' parameter in all versions up to, and including, 4.9.1. This is due to the plugin's database abstraction layer (`FlipperCode_Model_Base::is_column()`) treating user input wrapped in backticks as column names, bypassing the `esc_sql()` escaping function. Additionally, the `wpgmp_ajax_call` AJAX handler (registered for unauthenticated users via `wp_ajax_nopriv`) allows calling arbitrary class methods including `wpgmp_return_final_capability`, which passes the unsanitized `location_id` GET parameter directly to a database query. This makes it possible for unauthenticated attackers to append additional SQL…

PLUGIN Wp Google Map

CVE-2026-3222

HIGH CVSS 7.5 2026-03-11
Threat Entry Updated 2026-04-15

CVE-2026-2466 - Dukapress Plugin

The DukaPress WordPress plugin through 3.2.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

PLUGIN Dukapress

CVE-2026-2466

HIGH CVSS 7.1 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2707 - weForms – Easy Drag & Drop Contact Form Builder For WordPress Plugin

The weForms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the REST API entry submission endpoint in all versions up to, and including, 1.6.27. This is due to inconsistent input sanitization between the frontend AJAX handler and the REST API endpoint. When entries are submitted via the REST API (`/wp-json/weforms/v1/forms/{id}/entries/`), the `prepare_entry()` method in `class-abstract-fields.php` receives the WP_REST_Request object as `$args`, bypassing the `weforms_clean()` fallback that sanitizes `$_POST` data for frontend submissions. The base field handler only applies `trim()` to the value. This makes it possible for authenticated…

PLUGIN weForms – Easy Drag & Drop Contact Form Builder For WordPress

CVE-2026-2707

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2358 - WP ULike – Like & Dislike Buttons for Engagement and Feedback Plugin

The WP ULike plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `[wp_ulike_likers_box]` shortcode `template` attribute in all versions up to, and including, 5.0.1. This is due to the use of `html_entity_decode()` on shortcode attributes without subsequent output sanitization, which effectively bypasses WordPress's `wp_kses_post()` content filtering. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The post must have at least one like for the XSS to render.

PLUGIN WP ULike – Like & Dislike Buttons for Engagement and Feedback

CVE-2026-2358

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-04-15

CVE-2026-1753 - Gutena Forms Plugin

The Gutena Forms WordPress plugin before 1.6.1 does not validate option to be updated, which could allow contributors and above role to update arbitrary boolean and array options (such as users_can_register).

PLUGIN Gutena Forms

CVE-2026-1753

MEDIUM CVSS 6.8 2026-03-11
Threat Entry Updated 2026-04-15

CVE-2026-1867 - Front Editor Plugin

The Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6 allows passing a URL parameter to regenerate a .json file based on demo data that it initially creates. If an administrator modifies the demo form and enables admin notifications in the Guest posting / Frontend Posting / Front Editor WordPress plugin before 5.0.6's settings, it is possible for an unauthenticated attacker to export and download all of the form data/settings, including the administrator's email address.

PLUGIN Front Editor

CVE-2026-1867

MEDIUM CVSS 5.9 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2413 - Ally – Web Accessibility & Usability Plugin

The Ally – Web Accessibility & Usability plugin for WordPress is vulnerable to SQL Injection via the URL path in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user-supplied URL parameter in the `get_global_remediations()` method, where it is directly concatenated into an SQL JOIN clause without proper sanitization for SQL context. While `esc_url_raw()` is applied for URL safety, it does not prevent SQL metacharacters (single quotes, parentheses) from being injected. This makes it possible for unauthenticated attackers to append additional SQL queries into…

PLUGIN Ally – Web Accessibility & Usability

CVE-2026-2413

HIGH CVSS 7.5 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3453 - Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress

The ProfilePress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.16.11. This is due to missing ownership validation on the change_plan_sub_id parameter in the process_checkout() function. The ppress_process_checkout AJAX handler accepts a user-controlled subscription ID intended for plan upgrades, loads the subscription record, and cancels/expires it without verifying the subscription belongs to the requesting user. This makes it possible for authenticated attackers, with Subscriber-level access and above, to cancel and expire any other user's active subscription via the change_plan_sub_id parameter during…

PLUGIN Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress

CVE-2026-3453

HIGH CVSS 8.1 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-1781 - Mailchimp For Wp Plugin

The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 4.11.1. This is due to the plugin trusting the `_mc4wp_action` POST parameter without validation, allowing unauthenticated attackers to force the form to process unsubscribe actions instead of subscribe actions. This makes it possible for unauthenticated attackers to arbitrarily unsubscribe any email address from the connected Mailchimp audience via the `_mc4wp_action` parameter, granted they can obtain the form ID (which is publicly exposed in the HTML source).

PLUGIN Mailchimp For Wp

CVE-2026-1781

MEDIUM CVSS 6.5 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2324 - Calendar Booking Plugin For Appointments And Events

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.2.7. This is due to missing or incorrect nonce validation on the reload_preview() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Calendar Booking Plugin For Appointments And Events

CVE-2026-2324

MEDIUM CVSS 6.1 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-2569 - Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer Plugin

The Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via PDF page labels in all versions up to, and including, 2.4.20 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer

CVE-2026-2569

MEDIUM CVSS 6.4 2026-03-11
Threat Entry Updated 2026-03-11

CVE-2026-3228 - NextScripts: Social Networks Auto-Poster Plugin

The NextScripts: Social Networks Auto-Poster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `[nxs_fbembed]` shortcode in all versions up to, and including, 4.4.6. This is due to insufficient input sanitization and output escaping on the `snapFB` post meta value. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN NextScripts: Social Networks Auto-Poster

CVE-2026-3228

MEDIUM CVSS 6.4 2026-03-10
Scroll to top