Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 4281-4300 of 15036 records
Threat Entry Updated 2025-08-11

CVE-2025-6997 - Addons Plugin

The ThemeREX Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.35.1.1 due to insufficient input sanitization and output escaping. The plugin’s SVG rendering routine calls the trx_addons_get_svg_from_file() function on an unvalidated 'svg' parameter supplied via the shortcode or Elementor widget settings, then outputs it via the trx_addons_show_layout() function. Because there is no check on the URL’s origin, scheme, or the SVG content itself, authenticated attackers, with Contributor-level access and above, can supply a remote SVG and inject…

PLUGIN Addons

CVE-2025-6997

MEDIUM CVSS 6.4 2025-07-19
Threat Entry Updated 2025-07-22

CVE-2025-6721 - Mrkv Vchasno Kasa Plugin

The Vchasno Kasa plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the mrkv_vchasno_kasa_wc_do_metabox_action() function in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to generate invoices for arbitrary orders.

PLUGIN Mrkv Vchasno Kasa

CVE-2025-6721

MEDIUM CVSS 5.3 2025-07-19
Threat Entry Updated 2025-07-22

CVE-2025-6720 - Mrkv Vchasno Kasa Plugin

The Vchasno Kasa plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the clear_all_log() function in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to clear log files.

PLUGIN Mrkv Vchasno Kasa

CVE-2025-6720

MEDIUM CVSS 5.3 2025-07-19
Threat Entry Updated 2025-07-22

CVE-2025-7697 - Integration For Contact Form 7 And Google Sheets Plugin

The Integration for Google Sheets and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.1.1 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php…

PLUGIN Integration For Contact Form 7 And Google Sheets

CVE-2025-7697

CRITICAL CVSS 9.8 2025-07-19
Threat Entry Updated 2025-07-22

CVE-2025-7696 - Integration For Contact Form 7 And Pipedrive Plugin

The Integration for Pipedrive and Contact Form 7, WPForms, Elementor, Ninja Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.2.3 via deserialization of untrusted input within the verify_field_val() function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file…

PLUGIN Integration For Contact Form 7 And Pipedrive

CVE-2025-7696

CRITICAL CVSS 9.8 2025-07-19
Threat Entry Updated 2025-07-22

CVE-2025-7661 - Martinus Partnersky System Plugin

The Partnerský systém Martinus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'martinus' shortcode in all versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Martinus Partnersky System

CVE-2025-7661

MEDIUM CVSS 6.4 2025-07-19
Threat Entry Updated 2025-07-22

CVE-2025-7658 - Temporarily Hidden Content Plugin

The Temporarily Hidden Content plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'temphc-start' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Temporarily Hidden Content

CVE-2025-7658

MEDIUM CVSS 6.4 2025-07-19
Threat Entry Updated 2025-07-22

CVE-2025-7655 - Live Stream Badger Plugin

The Live Stream Badger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'livestream' shortcode in all versions up to, and including, 1.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Live Stream Badger

CVE-2025-7655

MEDIUM CVSS 6.4 2025-07-19
Threat Entry Updated 2025-07-22

CVE-2025-7653 - Epaybg Payments Plugin

The EPay.bg Payments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'epay' shortcode in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Epaybg Payments

CVE-2025-7653

MEDIUM CVSS 6.4 2025-07-19
Threat Entry Updated 2025-07-22

CVE-2025-7669 - Avishi Wp Paypal Payment Button Plugin

The Avishi WP PayPal Payment Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0. This is due to missing or incorrect nonce validation on the 'avishi-wp-paypal-payment-button/index.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Avishi Wp Paypal Payment Button

CVE-2025-7669

MEDIUM CVSS 6.1 2025-07-19
Threat Entry Updated 2025-07-22

CVE-2025-7444 - Loginpress Pro Plugin

The LoginPress Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.0.1. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token.

PLUGIN Loginpress Pro

CVE-2025-7444

CRITICAL CVSS 9.8 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-7772 - 1 Toolset For Wordpress Malware Removal Plugin

The Malcure Malware Scanner — #1 Toolset for WordPress Malware Removal plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 16.8 via the wpmr_inspect_file() function due to a missing capability check. This makes it possible for authenticated attackers, with subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

PLUGIN 1 Toolset For Wordpress Malware Removal

CVE-2025-7772

MEDIUM CVSS 6.5 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-7438 - Masterstudy Lms Pro Plugin

The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'install_and_activate_plugin' function in all versions up to, and including, 4.7.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. The vulnerability is difficult to exploit due to timing requirements and environmental factors.

PLUGIN Masterstudy Lms Pro

CVE-2025-7438

HIGH CVSS 7.5 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-7643 - Attachment Manager Plugin

The Attachment Manager plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the handle_actions() function in all versions up to, and including, 2.1.2. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Attachment Manager

CVE-2025-7643

CRITICAL CVSS 9.1 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-6718 - B1 Accounting Plugin

The B1.lt plugin for WordPress is vulnerable to SQL Injection due to a missing capability check on the b1_run_query AJAX action in all versions up to, and including, 2.2.56. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute and run arbitrary SQL commands.

PLUGIN B1 Accounting

CVE-2025-6718

HIGH CVSS 8.8 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-6717 - B1 Accounting Plugin

The B1.lt plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in all versions up to, and including, 2.2.56 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN B1 Accounting

CVE-2025-6717

MEDIUM CVSS 6.5 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-6719 - Terms Descriptions Plugin

The Terms descriptions plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.4.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Terms Descriptions

CVE-2025-6719

MEDIUM CVSS 4.4 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-6726 - Block Editor Gallery Slider Plugin

The Block Editor Gallery Slider plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the classic_gallery_slider_options() function in all versions up to, and including, 1.1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update limited post meta for arbitrary posts.

PLUGIN Block Editor Gallery Slider

CVE-2025-6726

MEDIUM CVSS 4.3 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-6222 - Manage User Wallet Theme

The WooCommerce Refund And Exchange with RMA - Warranty Management, Refund Policy, Manage User Wallet theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'ced_rnx_order_exchange_attach_files' function in all versions up to, and including, 3.2.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

THEME Manage User Wallet

CVE-2025-6222

CRITICAL CVSS 9.8 2025-07-18
Threat Entry Updated 2025-07-22

CVE-2025-5800 - Testimonial Post Type Plugin

The Testimonial Post type plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘auto_play’ parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Testimonial Post Type

CVE-2025-5800

MEDIUM CVSS 6.4 2025-07-18
Scroll to top