Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 5121-5140 of 15036 records
Threat Entry Updated 2025-05-06

CVE-2025-2105 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 4.8.11 via deserialization of untrusted input from the 'file' parameter of the 'raven_download_file' function. This makes it possible for attackers to inject a PHP Object through a PHAR file. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin…

PLUGIN Jupiter X Core

CVE-2025-2105

HIGH CVSS 8.1 2025-04-26
Threat Entry Updated 2025-05-06

CVE-2025-1458 - Element Pack Plugin

The Element Pack Addons for Elementor – Free Templates and Widgets for Your WordPress Websites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets like Dual Button, Creative Button, Image Stack and more in all versions up to, and including, 5.10.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Element Pack

CVE-2025-1458

MEDIUM CVSS 6.4 2025-04-26
Threat Entry Updated 2025-05-06

CVE-2024-13808 - Xpro Elementor Addons Pro Plugin

The Xpro Elementor Addons - Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.4.9 via the custom PHP widget. This is due to their only being client side controls when determining who can access the widget. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.

PLUGIN Xpro Elementor Addons Pro

CVE-2024-13808

HIGH CVSS 8.8 2025-04-26
Threat Entry Updated 2025-04-29

CVE-2025-2801 - E Create Custom Forms For Wordpress With A Smart Form Plugin For Smart Businesses

The The Create custom forms for WordPress with a smart form plugin for smart businesses plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.2.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

PLUGIN E Create Custom Forms For Wordpress With A Smart Form Plugin For Smart Businesses

CVE-2025-2801

HIGH CVSS 7.3 2025-04-26
Threat Entry Updated 2025-04-29

CVE-2025-3912 - Drop Contact Form Builder For Wordpress Plugin

The WS Form LITE – Drag & Drop Contact Form Builder for WordPress plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_config' function in all versions up to, and including, 1.10.35. This makes it possible for unauthenticated attackers to read the value of the plugin's settings, including API keys for integrated services.

PLUGIN Drop Contact Form Builder For Wordpress

CVE-2025-3912

MEDIUM CVSS 5.3 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-2470 - Service Finder Bookings Plugin

The Service Finder Bookings plugin for WordPress, used by the Service Finder - Directory and Job Board WordPress Theme, is vulnerable to privilege escalation in all versions up to, and including, 5.1. This is due to a lack of restriction on user role in the 'nsl_registration_store_extra_input' function. This makes it possible for unauthenticated attackers to register an account on the site with an arbitrary role, including Administrator, when registering via a social login. The Nextend Social Login plugin must be installed and configured to exploit the vulnerability.

PLUGIN Service Finder Bookings

CVE-2025-2470

CRITICAL CVSS 9.8 2025-04-25
Threat Entry Updated 2025-06-17

CVE-2024-11917 - Jobsearch Wp Job Board Plugin

The JobSearch WP Job Board plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.9.2. This is due to improper configurations in the 'jobsearch_xing_response_data_callback', 'set_access_tokes', and 'google_callback' functions. This makes it possible for unauthenticated attackers to log in as the first connected Xing user, or any connected Xing user if the Xing id is known. It is also possible for unauthenticated attackers to log in as the first connected Google user if the user has logged in, without subsequently logging out, in thirty days.…

PLUGIN Jobsearch Wp Job Board

CVE-2024-11917

HIGH CVSS 8.1 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-1565 - Mayosis Core Plugin

The Mayosis Core plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 5.4.1 via the library/wave-audio/peaks/remote_dl.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.

PLUGIN Mayosis Core

CVE-2025-1565

HIGH CVSS 7.5 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-1279 - Bm Content Builder Plugin

The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ux_cb_tools_import_item_ajax AJAX action in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

PLUGIN Bm Content Builder

CVE-2025-1279

HIGH CVSS 8.8 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-3870 - 1 Decembrie 1918 Plugin

The 1 Decembrie 1918 plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.dec.2012. This is due to missing or incorrect nonce validation on the 1-decembrie-1918/1-decembrie-1918.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN 1 Decembrie 1918

CVE-2025-3870

MEDIUM CVSS 6.1 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-3868 - Admin Bookmarks Plugin

The Custom Admin-Bar Favorites plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'menuObject' parameter in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Admin Bookmarks

CVE-2025-3868

MEDIUM CVSS 6.1 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-3867 - Ajax Comment Form Cst Plugin

The Ajax Comment Form CST plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2. This is due to missing or incorrect nonce validation via the 'acform_cst_settings' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Ajax Comment Form Cst

CVE-2025-3867

MEDIUM CVSS 6.1 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-3866 - Add Google Plus One Social Share Button Plugin

The Add Google +1 (Plus one) social share Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.0. This is due to missing or incorrect nonce validation on the google-plus-one-share-button page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Add Google Plus One Social Share Button

CVE-2025-3866

MEDIUM CVSS 6.1 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-2238 - Vikinger Theme

The Vikinger theme for WordPress is vulnerable to privilege in all versions up to, and including, 1.9.30. This is due to insufficient user_meta restrictions in the 'vikinger_user_meta_update_ajax' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to escalate their privileges to Administrator-level.

THEME Vikinger

CVE-2025-2238

HIGH CVSS 8.8 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-3743 - Upsell Funnel Builder For Woocommerce Plugin

The Upsell Funnel Builder for WooCommerce plugin for WordPress is vulnerable to order manipulation in all versions up to, and including, 3.0.0. This is due to the plugin allowing the additional product ID and discount field to be manipulated prior to processing via the 'add_offer_in_cart' function. This makes it possible for unauthenticated attackers to arbitrarily update the product associated with any order bump, and arbitrarily update the discount applied to any order bump item, when adding it to the cart.

PLUGIN Upsell Funnel Builder For Woocommerce

CVE-2025-3743

MEDIUM CVSS 5.3 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-3923 - Prevent Direct Access Plugin

The Prevent Direct Access – Protect WordPress Files plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.8 via the 'generate_unique_string' due to insufficient randomness of the generated file name. This makes it possible for unauthenticated attackers to extract sensitive data including files protected by the plugin if the attacker can determine the file name.

PLUGIN Prevent Direct Access

CVE-2025-3923

MEDIUM CVSS 5.3 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-3861 - Prevent Direct Access Plugin

The Prevent Direct Access – Protect WordPress Files plugin for WordPress is vulnerable to unauthorized access and modification of data| due to a misconfigured capability check on the 'pda_lite_custom_permission_check' function in versions 2.8.6 to 2.8.8.2. This makes it possible for authenticated attackers, with Contributor-level access and above, to access and change the protection status of media.

PLUGIN Prevent Direct Access

CVE-2025-3861

MEDIUM CVSS 5.4 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-2580 - Bit Form Plugin

The Contact Form by Bit Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.18.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Bit Form

CVE-2025-2580

MEDIUM CVSS 4.9 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-0671 - Icegram Express Plugin

The Icegram Express WordPress plugin before 5.7.50 does not sanitise and escape some of its Template settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

PLUGIN Icegram Express

CVE-2025-0671

MEDIUM CVSS 6.1 2025-04-25
Threat Entry Updated 2025-11-26

CVE-2025-3775 - Shoplentor Plugin

The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +20 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.1.2 via the woolentor_template_proxy function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application, and can be used to query and modify information from internal services.

PLUGIN Shoplentor

CVE-2025-3775

MEDIUM CVSS 6.5 2025-04-25
Scroll to top