Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 4401-4420 of 15036 records
Threat Entry Updated 2025-07-09

CVE-2025-6782 - Gozen Forms Plugin

The GoZen Forms plugin for WordPress is vulnerable to SQL Injection via the 'forms-id' parameter of the dirGZActiveForm() function in all versions up to, and including, 1.1.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Gozen Forms

CVE-2025-6782

HIGH CVSS 7.5 2025-07-04
Threat Entry Updated 2025-07-09

CVE-2025-6586 - Download Plugin

The Download Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the dpwap_plugin_locInstall function in all versions up to, and including, 2.2.8. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Download

CVE-2025-6586

HIGH CVSS 7.2 2025-07-04
Threat Entry Updated 2025-07-09

CVE-2025-6739 - Wpquiz Plugin

The WPQuiz plugin for WordPress is vulnerable to SQL Injection via the 'id' attribute of the 'wpquiz' shortcode in all versions up to, and including, 0.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Wpquiz

CVE-2025-6739

MEDIUM CVSS 6.5 2025-07-04
Threat Entry Updated 2025-07-09

CVE-2025-6729 - Paymaster For Woocommerce Plugin

The PayMaster for WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 0.4.31 via the 'wp_ajax_paym_status' AJAX action This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Paymaster For Woocommerce

CVE-2025-6729

MEDIUM CVSS 6.4 2025-07-04
Threat Entry Updated 2025-07-08

CVE-2025-6041 - Ycontributors Plugin

The yContributors plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.5. This is due to missing or incorrect nonce validation on the 'yContributors' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Ycontributors

CVE-2025-6041

MEDIUM CVSS 6.1 2025-07-04
Threat Entry Updated 2025-08-13

CVE-2025-5953 - Wp Human Resource Management Plugin

The WP Human Resource Management plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the ajax_insert_employee() and update_empoyee() functions in versions 2.0.0 through 2.2.17. The AJAX handler reads the client-supplied $_POST['role'] and, after basic cleaning via hrm_clean(), passes it directly to wp_insert_user() and later to $user->set_role() without verifying that the current user is allowed to assign that role. This makes it possible for authenticated attackers, with Employee-level access and above, to elevate their privileges to administrator.

PLUGIN Wp Human Resource Management

CVE-2025-5953

HIGH CVSS 8.8 2025-07-04
Threat Entry Updated 2025-08-13

CVE-2025-5956 - Wp Human Resource Management Plugin

The WP Human Resource Management plugin for WordPress is vulnerable to Arbitrary User Deletion due to a missing authorization within the ajax_delete_employee() function in versions 2.0.0 through 2.2.17. The plugin’s deletion handler reads the client-supplied $_POST['delete'] array and passes each ID directly to wp_delete_user() without verifying that the caller has the delete_users capability or limiting which user IDs may be removed. This makes it possible for authenticated attackers, with Employee-level access and above, to delete arbitrary accounts, including administrators.

PLUGIN Wp Human Resource Management

CVE-2025-5956

MEDIUM CVSS 6.5 2025-07-04
Threat Entry Updated 2025-07-08

CVE-2025-6039 - Processingjs For Wp Plugin

The ProcessingJS for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pjs4wp' shortcode in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Processingjs For Wp

CVE-2025-6039

MEDIUM CVSS 6.4 2025-07-04
Threat Entry Updated 2025-07-09

CVE-2025-5567 - Shortcodes Ultimate Plugin

The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'data-url' DOM element attribute in all versions up to, and including, 7.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Shortcodes Ultimate

CVE-2025-5567

MEDIUM CVSS 6.4 2025-07-04
Threat Entry Updated 2025-07-08

CVE-2025-5933 - Rd Wapp Plugin

The RD Contacto plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the rdWappUpdateData() function. This makes it possible for unauthenticated attackers to update plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Rd Wapp

CVE-2025-5933

MEDIUM CVSS 4.3 2025-07-04
Threat Entry Updated 2025-07-10

CVE-2025-5924 - Wp Firebase Push Notification Plugin

The WP Firebase Push Notification plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.0. This is due to missing or incorrect nonce validation on the wfpn_brodcast_notification_message() function. This makes it possible for unauthenticated attackers to send broadcast notifications via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Wp Firebase Push Notification

CVE-2025-5924

MEDIUM CVSS 4.3 2025-07-04
Threat Entry Updated 2025-07-10

CVE-2025-5322 - Vikrentcar Plugin

The VikRentCar Car Rental Management System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the do_updatecar and createcar functions in all versions up to, and including, 1.4.3. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible.

PLUGIN Vikrentcar

CVE-2025-5322

HIGH CVSS 7.2 2025-07-03
Threat Entry Updated 2025-07-09

CVE-2025-5961 - Migration Backup Staging Plugin

The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpvivid_upload_import_files' function in all versions up to, and including, 0.9.116. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: Uploaded files are only accessible on WordPress instances running on the NGINX web server as the existing .htaccess within the target file upload folder prevents…

PLUGIN Migration Backup Staging

CVE-2025-5961

HIGH CVSS 7.2 2025-07-03
Threat Entry Updated 2025-07-03

CVE-2025-2932 - Jkdevkit Plugin

The JKDEVKIT plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'font_upload_handler' function in all versions up to, and including, 1.9.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). If WooCommerce is enabled, attackers will need Contributor-level access and above.

PLUGIN Jkdevkit

CVE-2025-2932

HIGH CVSS 8.8 2025-07-03
Threat Entry Updated 2025-07-03

CVE-2025-2537 - Auto Thickbox Plugin

Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled ThickBox JavaScript library (version 3.1) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Auto Thickbox

CVE-2025-2537

MEDIUM CVSS 6.4 2025-07-03
Threat Entry Updated 2025-07-03

CVE-2025-2540 - Awesome Gallery Plugin

Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled prettyPhoto library (version 3.1.6) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Awesome Gallery

CVE-2025-2540

MEDIUM CVSS 6.4 2025-07-03
Threat Entry Updated 2025-07-03

CVE-2024-5647 - Bold Page Builder Plugin

Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled Magnific Popups library (version 1.1.0) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability was fixed in the upstream library (Magnific Popups version 1.2.0) by disabling the loading of HTML within certain fields by default.

PLUGIN Bold Page Builder

CVE-2024-5647

MEDIUM CVSS 6.4 2025-07-03
Threat Entry Updated 2025-07-03

CVE-2024-9017 - Groups Plugin

The PeepSo Core: Groups plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Group Description field in all versions up to, and including, 6.4.6.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Groups

CVE-2024-9017

HIGH CVSS 7.2 2025-07-03
Threat Entry Updated 2025-07-09

CVE-2025-5944 - Element Pack Plugin

The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-caption’ attribute in all versions up to, and including, 8.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Element Pack

CVE-2025-5944

MEDIUM CVSS 6.4 2025-07-03
Threat Entry Updated 2025-07-03

CVE-2025-4946 - Vikinger Theme

The Vikinger theme for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the vikinger_delete_activity_media_ajax() function in all versions up to, and including, 1.9.32. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). Note: Requires Vikinger Media plugin to be installed and active.

THEME Vikinger

CVE-2025-4946

HIGH CVSS 8.1 2025-07-02
Scroll to top