Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 5001-5020 of 15036 records
Threat Entry Updated 2025-05-21

CVE-2025-3878 - Sms Alert Order Notifications Plugin

The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sa_verify shortcode in all versions up to, and including, 3.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Sms Alert Order Notifications

CVE-2025-3878

MEDIUM CVSS 6.4 2025-05-10
Threat Entry Updated 2025-05-21

CVE-2025-3876 - Sms Alert Order Notifications Plugin

The SMS Alert Order Notifications – WooCommerce plugin for WordPress is vulnerable to Privilege Escalation due to insufficient user OTP validation in the handleWpLoginCreateUserAction() function in all versions up to, and including, 3.8.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to impersonate any account by supplying its username or email and elevate their privileges to that of an administrator.

PLUGIN Sms Alert Order Notifications

CVE-2025-3876

HIGH CVSS 8.8 2025-05-10
Threat Entry Updated 2025-05-12

CVE-2025-2158 - Wp Review Plugin

The WordPress Review Plugin: The Ultimate Solution for Building a Review Website plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 5.3.5 via the Post custom fields. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP file types can be uploaded and…

PLUGIN Wp Review

CVE-2025-2158

HIGH CVSS 8.8 2025-05-10
Threat Entry Updated 2025-05-12

CVE-2025-2944 - Jeg Elementor Kit Plugin

The Jeg Elementor Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Video Button and Countdown Widgets in all versions up to, and including, 2.6.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Jeg Elementor Kit

CVE-2025-2944

MEDIUM CVSS 6.4 2025-05-10
Threat Entry Updated 2025-05-12

CVE-2025-3794 - Wpforms Lite Plugin

The WPForms – Easy Form Builder for WordPress – Contact Forms, Payment Forms, Surveys, & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the start_timestamp parameter in all versions up to, and including, 1.9.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wpforms Lite

CVE-2025-3794

MEDIUM CVSS 5.4 2025-05-09
Threat Entry Updated 2025-05-12

CVE-2025-4206 - Groundhogg Plugin

The WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'process_export_delete' and 'process_import_delete' functions in all versions up to, and including, 4.1.1.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Groundhogg

CVE-2025-4206

HIGH CVSS 7.2 2025-05-09
Threat Entry Updated 2025-05-12

CVE-2025-3897 - Eucookielaw Plugin

The EUCookieLaw plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.7.2 via the 'file_get_contents' function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information. The vulnerability can only be exploited if a caching plugin such as W3 Total Cache is installed and activated.

PLUGIN Eucookielaw

CVE-2025-3897

MEDIUM CVSS 5.9 2025-05-09
Threat Entry Updated 2025-05-12

CVE-2025-4403 - Drag And Drop Multiple File Upload For Woocommerce Plugin

The Drag and Drop Multiple File Upload for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 1.1.6 due to accepting a user‐supplied supported_type string and the uploaded filename without enforcing real extension or MIME checks within the upload() function. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Drag And Drop Multiple File Upload For Woocommerce

CVE-2025-4403

CRITICAL CVSS 9.8 2025-05-09
Threat Entry Updated 2025-05-12

CVE-2025-3949 - Coming Soon Plugin

The Website Builder by SeedProd — Theme Builder, Landing Page Builder, Coming Soon Page, Maintenance Mode plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'seedprod_lite_get_revisisons' function in all versions up to, and including, 6.18.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the content of arbitrary landing page revisions.

PLUGIN Coming Soon

CVE-2025-3949

MEDIUM CVSS 4.3 2025-05-09
Threat Entry Updated 2025-05-12

CVE-2025-3605 - Frontend Login And Registration Blocks Plugin

The Frontend Login and Registration Blocks plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.7. This is due to the plugin not properly validating a user's identity prior to updating their details like email via the flr_blocks_user_settings_handle_ajax_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

PLUGIN Frontend Login And Registration Blocks

CVE-2025-3605

CRITICAL CVSS 9.8 2025-05-09
Threat Entry Updated 2025-05-12

CVE-2025-3455 - 1 Click Migration Plugin

The 1 Click WordPress Migration Plugin – 100% FREE for a limited time plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'start_restore' function in all versions up to, and including, 2.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN 1 Click Migration

CVE-2025-3455

HIGH CVSS 8.8 2025-05-09
Threat Entry Updated 2025-05-12

CVE-2024-11617 - Envolve Plugin

The Envolve Plugin plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'zetra_languageUpload' and 'zetra_fontsUpload' functions in all versions up to, and including, 1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Envolve

CVE-2024-11617

CRITICAL CVSS 9.8 2025-05-09
Threat Entry Updated 2025-06-27

CVE-2025-3811 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like email through the edit_newdata_customer_callback() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

PLUGIN Wpbookit

CVE-2025-3811

CRITICAL CVSS 9.8 2025-05-09
Threat Entry Updated 2025-06-27

CVE-2025-3810 - Wpbookit Plugin

The WPBookit plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like password and email through the edit_profile_data() function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses and passwords, including administrators, and leverage that to gain access to their account.

PLUGIN Wpbookit

CVE-2025-3810

CRITICAL CVSS 9.8 2025-05-09
Threat Entry Updated 2025-06-04

CVE-2025-3862 - Contest Gallery Plugin

Contest Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 26.0.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Contest Gallery

CVE-2025-3862

MEDIUM CVSS 6.4 2025-05-08
Threat Entry Updated 2025-06-04

CVE-2025-4208 - Nex Forms Plugin

The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to Limited Code Execution in all versions up to, and including, 8.9.1 via the get_table_records function. This is due to the unsanitized use of user-supplied input in call_user_func(). This makes it possible for authenticated attackers, with Custom-level access, to execute arbitrary PHP functions that meet specific constraints (static methods or global functions accepting a single array parameter).

PLUGIN Nex Forms

CVE-2025-4208

MEDIUM CVSS 6.3 2025-05-08
Threat Entry Updated 2025-06-04

CVE-2025-3468 - Nex Forms Plugin

The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the clean_html and form_fields parameters in all versions up to, and including, 8.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Custom-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Nex Forms

CVE-2025-3468

MEDIUM CVSS 6.4 2025-05-08
Threat Entry Updated 2025-06-04

CVE-2025-2806 - Tagdiv Composer Plugin

The tagDiv Composer plugin for WordPress, used by the Newspaper theme, is vulnerable to Reflected Cross-Site Scripting via the ‘data’ parameter in all versions up to, and including, 5.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Tagdiv Composer

CVE-2025-2806

MEDIUM CVSS 6.1 2025-05-08
Threat Entry Updated 2025-06-04

CVE-2025-4127 - Wp Seo Structured Data Schema Plugin

The WP SEO Structured Data Schema plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Price Range’ parameter in all versions up to, and including, 2.7.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts that will execute whenever an administrator accesses the plugin settings page.

PLUGIN Wp Seo Structured Data Schema

CVE-2025-4127

MEDIUM CVSS 6.4 2025-05-08
Threat Entry Updated 2025-06-04

CVE-2025-3419 - Eventin Plugin

The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to arbitrary file read in all versions up to, and including, 4.0.26 via the proxy_image() function. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

PLUGIN Eventin

CVE-2025-3419

HIGH CVSS 7.5 2025-05-08
Scroll to top