Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 5141-5160 of 15036 records
Threat Entry Updated 2025-04-29

CVE-2025-3752 - Accessible Html5 Media Player Plugin

The Able Player, accessible HTML5 media player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘preload’ parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Accessible Html5 Media Player

CVE-2025-3752

MEDIUM CVSS 6.4 2025-04-25
Threat Entry Updated 2025-04-29

CVE-2025-3749 - Breeze Display Plugin

The Breeze Display plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘cal_size’ parameter in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Breeze Display

CVE-2025-3749

MEDIUM CVSS 6.4 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-1294 - Eform Wordpress Form Builder Plugin

The eForm - WordPress Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 4.18.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Eform Wordpress Form Builder

CVE-2025-1294

HIGH CVSS 7.2 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-46533 - WordPress Core

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpdrift.no Landing pages and Domain aliases for WordPress allows Stored XSS. This issue affects Landing pages and Domain aliases for WordPress: from n/a through 0.8.

CORE WordPress Core

CVE-2025-46533

MEDIUM CVSS 5.9 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-3832 - Fusedesk Plugin

The FuseDesk plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘successredirect’ parameter in all versions up to, and including, 6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Fusedesk

CVE-2025-3832

MEDIUM CVSS 6.4 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-3793 - Buddy Press Force Password Change Plugin

The Buddypress Force Password Change plugin for WordPress is vulnerable to authenticated account takeover due to the plugin not properly validating a user's identity prior to updating their password through the 'bp_force_password_ajax' function in all versions up to, and including, 0.1. This makes it possible for authenticated attackers, with subscriber-level access and above and under certain prerequisites, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their accounts.

PLUGIN Buddy Press Force Password Change

CVE-2025-3793

MEDIUM CVSS 4.2 2025-04-24
Threat Entry Updated 2025-08-12

CVE-2025-3604 - Flynax Bridge Plugin

The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

PLUGIN Flynax Bridge

CVE-2025-3604

CRITICAL CVSS 9.8 2025-04-24
Threat Entry Updated 2025-08-12

CVE-2025-3603 - Flynax Bridge Plugin

The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.

PLUGIN Flynax Bridge

CVE-2025-3603

CRITICAL CVSS 9.8 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-3607 - Frontend Login And Registration Blocks Plugin

The Frontend Login and Registration Blocks plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.7. This is due to the plugin not properly validating a user's identity prior to updating a password. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account.

PLUGIN Frontend Login And Registration Blocks

CVE-2025-3607

HIGH CVSS 8.8 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-3776 - Verification Sms Targetsms Plugin

The Verification SMS with TargetSMS plugin for WordPress is vulnerable to limited Remote Code Execution in all versions up to, and including, 1.5 via the 'targetvr_ajax_handler' function. This is due to a lack of validation on the type of function that can be called. This makes it possible for unauthenticated attackers to execute any callable function on the site, such as phpinfo().

PLUGIN Verification Sms Targetsms

CVE-2025-3776

HIGH CVSS 8.3 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-3300 - Wpmastertoolkit Plugin

The WPMasterToolKit (WPMTK) – All in one plugin plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.5.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to read and modify the contents of arbitrary files on the server, which can contain sensitive information.

PLUGIN Wpmastertoolkit

CVE-2025-3300

HIGH CVSS 7.2 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-3280 - Elex Bulk Edit Products Prices Attributes For Woocommerce Basic Plugin

The ELEX WooCommerce Advanced Bulk Edit Products, Prices & Attributes plugin for WordPress is vulnerable to SQL Injection via the 'attribute_value_filter' parameter in all versions up to, and including, 1.4.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Elex Bulk Edit Products Prices Attributes For Woocommerce Basic

CVE-2025-3280

MEDIUM CVSS 6.5 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-3101 - Configurator Theme Core Plugin

The Configurator Theme Core plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.4.7. This is due to the plugin not properly validating user meta fields prior to updating them in the database. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change escalate their privileges to Administrator.

PLUGIN Configurator Theme Core

CVE-2025-3101

HIGH CVSS 8.8 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-3058 - Xelion Webchat Plugin

The Xelion Webchat plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the xwc_save_settings() function in all versions up to, and including, 9.1.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

PLUGIN Xelion Webchat

CVE-2025-3058

HIGH CVSS 8.8 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-2579 - Embed Lottie Player Plugin

The Lottie Player plugin for WordPress is vulnerable to Stored Cross-Site Scripting via File uploads in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the uploaded file.

PLUGIN Embed Lottie Player

CVE-2025-2579

MEDIUM CVSS 6.4 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-2543 - Advanced Accordion Block Plugin

The Advanced Accordion Gutenberg Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 5.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Advanced Accordion Block

CVE-2025-2543

MEDIUM CVSS 6.4 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-1284 - WooCommerce Plugin

The Woocommerce Automatic Order Printing | ( Formerly WooCommerce Google Cloud Print) plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1 via the xc_woo_printer_preview AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's invoices and orders which can contain sensitive information.

PLUGIN WooCommerce

CVE-2025-1284

MEDIUM CVSS 4.3 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2024-13307 - Reales Wp Real Estate Wordpress Theme

The Reales WP - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized modification and loss of data due to a missing capability check on the 'reales_delete_file', 'reales_delete_file_plans', 'reales_add_to_favourites', and 'reales_remove_from_favourites' functions in all versions up to, and including, 2.1.2. This makes it possible for unauthenticated attackers to delete arbitrary attachments, and add or remove favorite property listings for any user.

THEME Reales Wp Real Estate Wordpress Theme

CVE-2024-13307

MEDIUM CVSS 5.3 2025-04-24
Threat Entry Updated 2025-04-29

CVE-2025-3761 - Accessible Event Ticketing Plugin

The My Tickets – Accessible Event Ticketing plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.0.16. This is due to the mt_save_profile() function not appropriately restricting access to unauthorized users to update roles. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update their role to that of an administrator.

PLUGIN Accessible Event Ticketing

CVE-2025-3761

HIGH CVSS 8.8 2025-04-24
Threat Entry Updated 2025-06-23

CVE-2025-2558 - Wound Plugin

The-wound WordPress theme through 0.0.1 does not validate some parameters before using them to generate paths passed to include function/s, allowing unauthenticated users to perform LFI attacks and download arbitrary file from the server

PLUGIN Wound

CVE-2025-2558

HIGH CVSS 8.6 2025-04-24
Scroll to top