Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,897
Critical917
High3,023
Medium10,759
Reset
Showing 41-60 of 14897 records
Threat Entry Updated 2026-04-13

CVE-2026-4895 - Greenshift Animation And Page Builder Blocks Plugin

The GreenShift - Animation and Page Builder Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 12.8.9 This is due to insufficient input sanitization and output escaping in the gspb_greenShift_block_script_assets() function. The function uses str_replace() to insert 'fetchpriority="high"' before 'src=' attributes when processing greenshift-blocks/image blocks with the disablelazy attribute enabled. Because this replacement operates on the entire HTML string without parsing, contributors can inject the string 'src=' into HTML attribute values (such as class attributes). When the str_replace executes, the double quotes in…

PLUGIN Greenshift Animation And Page Builder Blocks

CVE-2026-4895

MEDIUM CVSS 6.4 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-3498 - Blockart Blocks Plugin

The BlockArt Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'clientId' block attribute in all versions up to, and including, 2.2.15. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Blockart Blocks

CVE-2026-3498

MEDIUM CVSS 6.4 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-4979 - Members Directory Plugin For Wp

The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WP plugin for WordPress is vulnerable to blind Server-Side Request Forgery in all versions up to, and including, 1.2.58. This is due to insufficient URL origin validation in the process_image_crop() method when processing avatar/banner image crop operations. The function accepts a user-controlled URL via the uwp_crop POST parameter and only validates it using esc_url() for sanitization and wp_check_filetype() for extension verification, without enforcing that the URL references a local uploads file. The URL is then…

PLUGIN Members Directory Plugin For Wp

CVE-2026-4979

MEDIUM CVSS 5.0 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-3358 - Elearning And Online Course Solution Plugin

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to unauthorized private course enrollment in all versions up to, and including, 3.9.7. This is due to missing post_status validation in the `enroll_now()` and `course_enrollment()` functions. Both enrollment endpoints verify the nonce, user authentication, and whether the course is purchasable, but fail to check if the course has a `private` post_status. This makes it possible for authenticated attackers with Subscriber-level access or above to enroll in private courses by sending a crafted POST request with the…

PLUGIN Elearning And Online Course Solution

CVE-2026-3358

MEDIUM CVSS 5.4 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-3371 - Elearning And Online Course Solution Plugin

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authorization checks in the `save_course_content_order()` private method, which is called unconditionally by the `tutor_update_course_content_order` AJAX handler. While the handler's `content_parent` branch includes a `can_user_manage()` check, the `save_course_content_order()` call processes attacker-supplied `tutor_topics_lessons_sorting` JSON without any ownership or capability verification. This makes it possible for authenticated attackers with Subscriber-level access or above to detach lessons from topics, reorder course content,…

PLUGIN Elearning And Online Course Solution

CVE-2026-3371

MEDIUM CVSS 4.3 2026-04-11
Threat Entry Updated 2026-04-13

CVE-2026-4162 - Gravity Smtp Plugin

The Gravity SMTP plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.1.4. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to uninstall and deactivate the plugin and delete plugin options. NOTE: This vulnerability is also exploitable via a Cross-Site Request Forgery vector.

PLUGIN Gravity Smtp

CVE-2026-4162

HIGH CVSS 7.1 2026-04-10
Threat Entry Updated 2026-04-15

CVE-2026-4432 - Yith Woocommerce Wishlist Plugin

The YITH WooCommerce Wishlist WordPress plugin before 4.13.0 does not properly validate wishlist ownership in the save_title() AJAX handler before allowing wishlist renaming operations. The function only checks for a valid nonce, which is publicly exposed in the page source of the /wishlist/ page, making it possible for unauthenticated attackers to rename any wishlist belonging to any user on the site.

PLUGIN Yith Woocommerce Wishlist

CVE-2026-4432

MEDIUM CVSS 6.5 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-2305 - Addfunc Head Footer Code Plugin

The AddFunc Head & Footer Code plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `aFhfc_head_code`, `aFhfc_body_code`, and `aFhfc_footer_code` post meta values in all versions up to, and including, 2.3. This is due to the plugin outputting these meta values without any sanitization or escaping. While the plugin restricts its own metabox and save handler to administrators via `current_user_can('manage_options')`, it does not use `register_meta()` with an `auth_callback` to protect these meta keys. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web…

PLUGIN Addfunc Head Footer Code

CVE-2026-2305

MEDIUM CVSS 6.4 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-4351 - Perfmatters Plugin

The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2.5.9. This is due to the `PMCS::action_handler()` method processing the bulk action `activate`/`deactivate` handlers without any authorization check or nonce verification. The `$_GET['snippets'][]` values are passed unsanitized to `Snippet::activate()`/`Snippet::deactivate()` which call `Snippet::update()` then `file_put_contents()` with the traversed path. This makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite arbitrary files on the server with a fixed PHP docblock content, potentially causing denial of service by…

PLUGIN Perfmatters

CVE-2026-4351

HIGH CVSS 8.1 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-3360 - Elearning And Online Course Solution Plugin

The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to an Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authentication and authorization checks in the `pay_incomplete_order()` function. The function accepts an attacker-controlled `order_id` parameter and uses it to look up order data, then writes billing fields to the order owner's profile (`$order_data->user_id`) without verifying the requester's identity or ownership. Because the Tutor nonce (`_tutor_nonce`) is exposed on public frontend pages, this makes it possible for unauthenticated…

PLUGIN Elearning And Online Course Solution

CVE-2026-3360

HIGH CVSS 7.5 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-4305 - Royal Backup Reset Plugin

The Royal WordPress Backup & Restore Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpr_pending_template' parameter in all versions up to, and including, 1.0.16 due to insufficient input validation. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an administrator into performing an action such as clicking on a link.

PLUGIN Royal Backup Reset

CVE-2026-4305

MEDIUM CVSS 6.1 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-4664 - Customer Reviews Woocommerce Plugin

The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 5.103.0. This is due to the `create_review_permissions_check()` function comparing the user-supplied `key` parameter against the order's `ivole_secret_key` meta value using strict equality (`===`), without verifying that the stored key is non-empty. For orders where no review reminder email has been sent, the `ivole_secret_key` meta is not set, causing `get_meta()` to return an empty string. An attacker can supply `key: ""` to match this empty value and bypass the permission check.…

PLUGIN Customer Reviews Woocommerce

CVE-2026-4664

MEDIUM CVSS 5.3 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-4977 - Members Directory Plugin

The UsersWP – Front-end login form, User Registration, User Profile & Members Directory plugin for WordPress is vulnerable to Improper Access Control in all versions up to, and including, 1.2.58 This is due to insufficient field-level permission validation in the upload_file_remove() AJAX handler where the $htmlvar parameter is not validated against a whitelist of allowed fields or checked against the field's for_admin_use property. This makes it possible for authenticated attackers, with subscriber-level access and above, to clear or reset any restricted usermeta column for their own user record, including fields…

PLUGIN Members Directory

CVE-2026-4977

MEDIUM CVSS 4.3 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-4057 - Download Manager Plugin

The Download Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `makeMediaPublic()` and `makeMediaPrivate()` functions in all versions up to, and including, 3.3.51. This is due to the functions only checking for `edit_posts` capability without verifying post ownership via `current_user_can('edit_post', $id)`, and the destructive operations executing before the admin-level check in `mediaAccessControl()`. This makes it possible for authenticated attackers, with Contributor-level access and above, to strip all protection metadata (password, access restrictions, private flag) from any media file they do…

PLUGIN Download Manager

CVE-2026-4057

MEDIUM CVSS 4.3 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-1263 - Webling Plugin

The Webling plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 3.9.0 due to insufficient input sanitization, insufficient output escaping, and missing capabilities checks in the 'webling_admin_save_form' and 'webling_admin_save_memberlist' functions. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject Webling forms and memberlists with arbitrary web scripts that will execute whenever an administrator views the related form or memberlist area of the WordPress admin.

PLUGIN Webling

CVE-2026-1263

MEDIUM CVSS 6.4 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-2712 - Wp Optimize Plugin

The WP-Optimize plugin for WordPress is vulnerable to unauthorized access of functionality due to missing capability checks in the `receive_heartbeat()` function in `includes/class-wp-optimize-heartbeat.php` in all versions up to, and including, 4.5.0. This is due to the Heartbeat handler directly invoking `Updraft_Smush_Manager_Commands` methods without verifying user capabilities, nonce tokens, or the allowed commands whitelist that the normal AJAX handler (`updraft_smush_ajax`) enforces. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke admin-only Smush operations including reading log files (`get_smush_logs`), deleting all backup images (`clean_all_backup_images`), triggering bulk image…

PLUGIN Wp Optimize

CVE-2026-2712

MEDIUM CVSS 5.4 2026-04-10
Threat Entry Updated 2026-04-13

CVE-2026-1924 - Aruba Hispeed Cache Plugin

The Aruba HiSpeed Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.0.4. This is due to missing nonce verification on the `ahsc_ajax_reset_options()` function. This makes it possible for unauthenticated attackers to reset all plugin settings to their default values via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Aruba Hispeed Cache

CVE-2026-1924

MEDIUM CVSS 4.3 2026-04-10
Threat Entry Updated 2026-04-15

CVE-2026-34424 - WordPress Core

Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-stage remote access toolkit injected through a compromised update system that allows unauthenticated attackers to execute arbitrary code and commands. Attackers can trigger pre-authentication remote shell execution via HTTP headers, establish authenticated backdoors accepting arbitrary PHP code or OS commands, create hidden administrator accounts, exfiltrate credentials and access keys, and maintain persistence through multiple injection points including must-use plugins and core file modifications.

CORE WordPress Core

CVE-2026-34424

CRITICAL CVSS 9.3 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-3005 - List Category Posts Plugin

The List category posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'catlist' shortcode in all versions up to, and including, 0.94.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN List Category Posts

CVE-2026-3005

MEDIUM CVSS 6.4 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-2519 - Bookly Responsive Appointment Booking Tool Plugin

The Online Scheduling and Appointment Booking System – Bookly plugin for WordPress is vulnerable to price manipulation via the 'tips' parameter in all versions up to, and including, 27.0. This is due to the plugin trusting a user-supplied input without server-side validation against the configured price. This makes it possible for unauthenticated attackers to submit a negative number to the 'tips' parameter, causing the total price to be reduced to zero.

PLUGIN Bookly Responsive Appointment Booking Tool

CVE-2026-2519

MEDIUM CVSS 5.3 2026-04-09
Scroll to top