Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 4421-4440 of 15036 records
Threat Entry Updated 2025-07-10

CVE-2025-2330 - All In One Addons For Elementor Plugin

The All-in-One Addons for Elementor – WidgetKit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'button+modal' widget in all versions up to, and including, 2.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN All In One Addons For Elementor

CVE-2025-2330

MEDIUM CVSS 6.4 2025-07-02
Threat Entry Updated 2025-07-03

CVE-2024-13786 - Education Theme

The education theme for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.6.10 via deserialization of untrusted input in the 'themerex_callback_view_more_posts' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may…

THEME Education

CVE-2024-13786

CRITICAL CVSS 9.8 2025-07-02
Threat Entry Updated 2025-07-07

CVE-2025-6464 - Forminator Plugin

The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.44.2 via deserialization of untrusted input in the 'entry_delete_upload_files' function. This makes it possible for unauthenticated attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is…

PLUGIN Forminator

CVE-2025-6464

HIGH CVSS 7.5 2025-07-02
Threat Entry Updated 2025-07-10

CVE-2024-13451 - Bit Form Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.17.4 via file uploads due to insufficient directory listing prevention and lack of randomization of file names. This makes it possible for unauthenticated attackers to extract sensitive data including files uploaded via a form. The vulnerability was partially patched in version 2.17.5.

PLUGIN Bit Form

CVE-2024-13451

MEDIUM CVSS 5.3 2025-07-02
Threat Entry Updated 2025-07-07

CVE-2025-6463 - Forminator Plugin

The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'entry_delete_upload_files' function in all versions up to, and including, 1.44.2. This makes it possible for unauthenticated attackers to include arbitrary file paths in a form submission. The file will be deleted when the form submission is deleted, whether by an Administrator or via auto-deletion determined by plugin settings. This can easily lead to remote code execution when the right file is…

PLUGIN Forminator

CVE-2025-6463

HIGH CVSS 8.8 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-6687 - Magic Buttons For Elementor Plugin

The Magic Buttons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's magic-button shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Magic Buttons For Elementor

CVE-2025-6687

MEDIUM CVSS 6.4 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-6686 - Magic Buttons For Elementor Plugin

The Magic Buttons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's magic-button shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Magic Buttons For Elementor

CVE-2025-6686

MEDIUM CVSS 6.4 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-6459 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.89. This is due to missing or incorrect nonce validation on the bsaCreateAdTemplate function. This makes it possible for unauthenticated attackers to inject and execute arbitrary PHP code via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Ads Pro

CVE-2025-6459

HIGH CVSS 8.8 2025-07-02
Threat Entry Updated 2025-07-03

CVE-2025-5746 - Woocommerce Plugin

The Drag and Drop Multiple File Upload (Pro) - WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the dnd_upload_cf7_upload_chunks() function in version 5.0 - 5.0.5 (when bundled with the PrintSpace theme) and all versions up to, and including, 1.7.1 (in the standalone version). This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. The execution of PHP is disabled via a .htaccess file but is still possible in…

PLUGIN Woocommerce

CVE-2025-5746

CRITICAL CVSS 9.8 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-6437 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to SQL Injection via the ‘oid’ parameter in all versions up to, and including, 4.89 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ads Pro

CVE-2025-6437

HIGH CVSS 7.5 2025-07-02
Threat Entry Updated 2025-07-16

CVE-2025-5817 - Amazon Products To Woocommerce Plugin

The Amazon Products to WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.2.7 via the wcta2w_get_urls(). This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Amazon Products To Woocommerce

CVE-2025-5817

HIGH CVSS 7.2 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-5339 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘bsa_pro_id’ parameter in all versions up to, and including, 4.89 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ads Pro

CVE-2025-5339

HIGH CVSS 7.5 2025-07-02
Threat Entry Updated 2025-07-03

CVE-2025-5014 - Real Estate Wordpress Theme

The Home Villas | Real Estate WordPress Theme theme for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'wp_rem_cs_widget_file_delete' function in all versions up to, and including, 2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

THEME Real Estate Wordpress Theme

CVE-2025-5014

HIGH CVSS 8.8 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-4689 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion which leads to Remote Code Execution in all versions up to, and including, 4.89. This is due to the presence of a SQL Injection vulnerability and Local File Inclusion vulnerability that can be chained with an image upload. This makes it possible for unauthenticated attackers to execute code on the server upload image files on the server than can be fetched via a SQL injection vulnerability, and ultimately executed as PHP code…

PLUGIN Ads Pro

CVE-2025-4689

CRITICAL CVSS 9.8 2025-07-02
Threat Entry Updated 2025-07-03

CVE-2025-4654 - Soumettre Fr Plugin

The Soumettre.fr plugin for WordPress is vulnerable to unauthorized access and modification of data due to a improper authorization checks on the make_signature function in all versions up to, and including, 2.1.5. This makes it possible for unauthenticated attackers to create/edit/delete Soumettre posts. This vulnerability affects only installations where the soumettre account is not connected (i.e. API key is not installed)

PLUGIN Soumettre Fr

CVE-2025-4654

LOW CVSS 3.7 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-4381 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to SQL Injection via the ‘$id’ variable of the getSpace() function in all versions up to, and including, 4.89 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ads Pro

CVE-2025-4381

HIGH CVSS 7.5 2025-07-02
Threat Entry Updated 2025-07-08

CVE-2025-4380 - Ads Pro Plugin

The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the…

PLUGIN Ads Pro

CVE-2025-4380

HIGH CVSS 8.1 2025-07-02
Threat Entry Updated 2025-07-16

CVE-2024-11405 - Wp Front End Login And Register Plugin

The WP Front-end login and register plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the email and wpmp_reset_password_token parameters in all versions up to, and including, 2.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Wp Front End Login And Register

CVE-2024-11405

MEDIUM CVSS 6.1 2025-07-02
Threat Entry Updated 2025-09-30

CVE-2025-5692 - Lead Form Data Collection To Crm Plugin

The Lead Form Data Collection to CRM plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on several functions in the ~/includes/LB_admin_ajax.php file in all versions up to, and including, 3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform several actions like updating settings. Initially this CVE was assigned specifically to all AJAX actions and the doFieldAjaxAction() function, however it was determined that CVE-2025-47690 is assigned to the doFieldAjaxAction() function that leads to arbitrary options updates.

PLUGIN Lead Form Data Collection To Crm

CVE-2025-5692

MEDIUM CVSS 6.3 2025-07-02
Threat Entry Updated 2025-07-03

CVE-2025-5314 - 3d Flipbook Dflip Lite Plugin

The Dear Flipbook – PDF Flipbook, 3D Flipbook, PDF embed, PDF viewer plugin for WordPress is vulnerable to DOM-Based Reflected Cross-Site Scripting via the ‘pdf-source’ parameter in all versions up to, and including, 2.3.65 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN 3d Flipbook Dflip Lite

CVE-2025-5314

MEDIUM CVSS 6.1 2025-07-01
Scroll to top