Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 4681-4700 of 15036 records
Threat Entry Updated 2025-06-09

CVE-2025-4429 - Gearside Developer Dashboard Plugin

The Gearside Developer Dashboard WordPress plugin through 1.0.72 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

PLUGIN Gearside Developer Dashboard

CVE-2025-4429

MEDIUM CVSS 6.1 2025-05-30
Threat Entry Updated 2025-05-30

CVE-2025-4659 - Ninja Forms Plugin

The Integration for Salesforce and Contact Form 7, WPForms, Elementor, Formidable, Ninja Forms plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.4.4. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.

PLUGIN Ninja Forms

CVE-2025-4659

MEDIUM CVSS 5.3 2025-05-30
Threat Entry Updated 2025-05-29

CVE-2025-5286 - Bold Page Builder Plugin

The Bold Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘additional_settings’ parameter in all versions up to, and including, 5.3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Bold Page Builder

CVE-2025-5286

MEDIUM CVSS 6.4 2025-05-29
Threat Entry Updated 2025-05-29

CVE-2025-5122 - Map Block Leaflet Plugin

The Map Block Leaflet plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Map Block Leaflet

CVE-2025-5122

MEDIUM CVSS 6.4 2025-05-29
Threat Entry Updated 2025-08-12

CVE-2025-4670 - Easy Digital Downloads Plugin

The Easy Digital Downloads – eCommerce Payments and Subscriptions made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's edd_receipt shortcode in all versions up to, and including, 3.3.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Easy Digital Downloads

CVE-2025-4670

MEDIUM CVSS 6.4 2025-05-29
Threat Entry Updated 2025-05-29

CVE-2025-4583 - Instagram Feed Plugin

The Smash Balloon Social Photo Feed – Easy Social Feeds Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `data-plugin` attribute in all versions up to, and including, 6.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Instagram Feed

CVE-2025-4583

MEDIUM CVSS 5.4 2025-05-29
Threat Entry Updated 2025-05-28

CVE-2025-4963 - Wpextended Plugin

The WP Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.0.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Wpextended

CVE-2025-4963

MEDIUM CVSS 6.4 2025-05-28
Threat Entry Updated 2025-05-28

CVE-2025-5287 - Inprosysmedia Likes Dislikes Post Plugin

The Likes and Dislikes Plugin plugin for WordPress is vulnerable to SQL Injection via the 'post' parameter in all versions up to, and including, 1.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Inprosysmedia Likes Dislikes Post

CVE-2025-5287

HIGH CVSS 7.5 2025-05-28
Threat Entry Updated 2025-05-28

CVE-2025-5082 - Wp Attachments Plugin

The WP Attachments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘attachment_id’ parameter in all versions up to, and including, 5.0.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Wp Attachments

CVE-2025-5082

MEDIUM CVSS 6.1 2025-05-28
Threat Entry Updated 2025-05-28

CVE-2025-4800 - Masterstudy Lms Pro Plugin

The MasterStudy LMS Pro plugin for WordPress is vulnerable to arbitrary file uploads due to a missing file type validation in the stm_lms_add_assignment_attachment function in all versions up to, and including, 4.7.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible.

PLUGIN Masterstudy Lms Pro

CVE-2025-4800

HIGH CVSS 8.8 2025-05-28
Threat Entry Updated 2025-05-28

CVE-2025-3704 - WordPress Core

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DBAR Productions Volunteer Sign Up Sheets allows Stored XSS.This issue affects Volunteer Sign Up Sheets: from n/a before 5.5.5. The patch is available exclusively on GitHub at https://github.com/dbarproductions/pta-volunteer-sign-up-sheets , as the vendor encounters difficulties using SVN to deploy to the WordPress.org repository.

CORE WordPress Core

CVE-2025-3704

MEDIUM CVSS 5.9 2025-05-27
Threat Entry Updated 2025-05-28

CVE-2025-5117 - Property Plugin

The Property plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the use of the property_package_user_role metadata in versions 1.0.5 to 1.0.6. This makes it possible for authenticated attackers, with Author‐level access and above, to elevate their privileges to that of an administrator by creating a package post whose property_package_user_role is set to administrator and then submitting the PayPal registration form.

PLUGIN Property

CVE-2025-5117

HIGH CVSS 8.8 2025-05-27
Threat Entry Updated 2025-07-07

CVE-2025-4683 - Mstore Api Plugin

The MStore API – Create Native Android & iOS Apps On The Cloud plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the create_blog function in all versions up to, and including, 4.17.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new posts.

PLUGIN Mstore Api

CVE-2025-4683

MEDIUM CVSS 4.3 2025-05-27
Threat Entry Updated 2025-05-28

CVE-2025-4682 - Essential Blocks Plugin

The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via HTML attributes in Slider and Post Carousel widgets in all versions up to, and including, 5.4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Essential Blocks

CVE-2025-4682

MEDIUM CVSS 6.4 2025-05-27
Threat Entry Updated 2025-08-12

CVE-2025-4783 - Exclusive Addons For Elementor Plugin

The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTML attributes of the Countdown Timer Widget in all versions up to, and including, 2.7.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Exclusive Addons For Elementor

CVE-2025-4783

MEDIUM CVSS 6.4 2025-05-27
Threat Entry Updated 2025-05-28

CVE-2025-4223 - Drag And Drop Website Builder Plugin

The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘login_url’ parameter in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. A valid username/password pair needs to be supplied in order to be successfully exploited and any injected scripts…

PLUGIN Drag And Drop Website Builder

CVE-2025-4223

MEDIUM CVSS 4.7 2025-05-24
Threat Entry Updated 2025-07-11

CVE-2025-5058 - Emagicone Store Manager For Woocommerce Plugin

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_image() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. This is only exploitable by unauthenticated attackers in default configurations where the the default password is left as 1:1, or where the attacker gains access to the credentials.

PLUGIN Emagicone Store Manager For Woocommerce

CVE-2025-5058

CRITICAL CVSS 9.8 2025-05-24
Threat Entry Updated 2025-07-11

CVE-2025-4603 - Emagicone Store Manager For Woocommerce Plugin

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_file() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). This is only exploitable by unauthenticated attackers in default configurations where the the default password is left as 1:1, or where the attacker gains access to…

PLUGIN Emagicone Store Manager For Woocommerce

CVE-2025-4603

CRITICAL CVSS 9.1 2025-05-24
Threat Entry Updated 2025-07-11

CVE-2025-4602 - Emagicone Store Manager For Woocommerce Plugin

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to Arbitrary File Reads in all versions up to, and including, 1.2.5 via the get_file() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. This is only exploitable by unauthenticated attackers in default configurations where the the default password is left as 1:1, or where the attacker gains access to the credentials.

PLUGIN Emagicone Store Manager For Woocommerce

CVE-2025-4602

MEDIUM CVSS 5.9 2025-05-24
Threat Entry Updated 2025-07-11

CVE-2025-4336 - Emagicone Store Manager For Woocommerce Plugin

The eMagicOne Store Manager for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the set_file() function in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. This is only exploitable by unauthenticated attackers in default configurations where the the default password is left as 1:1, or where the attacker gains access to the credentials.

PLUGIN Emagicone Store Manager For Woocommerce

CVE-2025-4336

HIGH CVSS 8.1 2025-05-24
Scroll to top