Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 5981-6000 of 15036 records
Threat Entry Updated 2025-02-21

CVE-2024-11376 - S2member Plugin

The s2Member – Excellent for All Kinds of Memberships, Content Restriction Paywalls & Member Access Subscriptions plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 241114. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN S2member

CVE-2024-11376

MEDIUM CVSS 6.1 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13523 - Memorialday Plugin

The MemorialDay plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.4. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Memorialday

CVE-2024-13523

MEDIUM CVSS 6.1 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13315 - Shopwarden Plugin

The Shopwarden – Automated WooCommerce monitoring & testing plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.11. This is due to missing or incorrect nonce validation on the save_setting() function. This makes it possible for unauthenticated attackers to update arbitrary options and achieve privilege escalation via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Shopwarden

CVE-2024-13315

HIGH CVSS 8.8 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13556 - Affiliate Links Plugin

The Affiliate Links: WordPress Plugin for Link Cloaking and Link Management plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.0.1 via deserialization of untrusted input from an file export. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin…

PLUGIN Affiliate Links

CVE-2024-13556

HIGH CVSS 8.1 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13438 - Speedsize Image Video Ai Optimizer Plugin

The SpeedSize Image & Video AI-Optimizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.1. This is due to missing or incorrect nonce validation on the 'speedsize_clear_css_cache_action' function. This makes it possible for unauthenticated attackers to clear the plugins cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Speedsize Image Video Ai Optimizer

CVE-2024-13438

MEDIUM CVSS 4.3 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2025-0805 - Mortgage Loan Calculator Plugin

The Mortgage Calculator / Loan Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mlcalc' shortcode in all versions up to, and including, 1.5.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Mortgage Loan Calculator

CVE-2025-0805

MEDIUM CVSS 6.4 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13852 - Option Editor Plugin

The Option Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing nonce validation on the plugin_page() function. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.

PLUGIN Option Editor

CVE-2024-13852

HIGH CVSS 8.8 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13848 - Reaction Buttons Plugin

The Reaction Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Reaction Buttons

CVE-2024-13848

MEDIUM CVSS 5.5 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2025-0796 - Wprequal Plugin

The Mortgage Lead Capture System plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 8.2.10. This is due to missing or incorrect nonce validation on the 'wprequal_reset_defaults' action. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Wprequal

CVE-2025-0796

MEDIUM CVSS 4.3 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13725 - Keap Official Opt In Forms Plugin

The Keap Official Opt-in Forms plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0.1 via the service parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included. If register_argc_argv is enabled on the server and pearcmd.php is installed, this issue might lead…

PLUGIN Keap Official Opt In Forms

CVE-2024-13725

CRITICAL CVSS 9.8 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13684 - Reset Plugin

The Reset plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.6. This is due to missing or incorrect nonce validation on the reset_db_page() function. This makes it possible for unauthenticated attackers to reset several tables in the database like comments, themes, plugins, and more via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Reset

CVE-2024-13684

HIGH CVSS 8.1 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13687 - Team Builder Plugin

The Team Builder – Meet the Team plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save_team_builder_options() function in all versions up to, and including, 1.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's settings.

PLUGIN Team Builder

CVE-2024-13687

MEDIUM CVSS 4.3 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13677 - Get Bookings Wp Plugin

The GetBookingsWP – Appointments Booking Calendar Plugin For WordPress plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.1.27. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.

PLUGIN Get Bookings Wp

CVE-2024-13677

HIGH CVSS 8.8 2025-02-18
Threat Entry Updated 2025-03-17

CVE-2024-13622 - File Uploads Addon For Woocommerce Plugin

The File Uploads Addon for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.7.1 via the 'uploads' directory. This makes it possible for unauthenticated attackers to extract sensitive data stored insecurely in the /wp-content/uploads directory which can contain file attachments uploaded by customers.

PLUGIN File Uploads Addon For Woocommerce

CVE-2024-13622

HIGH CVSS 7.5 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13609 - 1 Click Migration Plugin

The 1 Click WordPress Migration Plugin – 100% FREE for a limited time plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1 via the class-ocm-backup.php. This makes it possible for unauthenticated attackers to extract sensitive data including usernames and their respective password hashes during a short window of time in which the backup is in process.

PLUGIN 1 Click Migration

CVE-2024-13609

MEDIUM CVSS 5.9 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13595 - Simple Signup Form Plugin

The Simple Signup Form plugin for WordPress is vulnerable to SQL Injection via the 'id' attribute of the 'ssf' shortcode in all versions up to, and including, 1.6.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Simple Signup Form

CVE-2024-13595

MEDIUM CVSS 6.5 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13588 - Simplebooklet Plugin

The Simplebooklet PDF Viewer and Embedder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'simplebooklet' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Simplebooklet

CVE-2024-13588

MEDIUM CVSS 6.4 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13587 - Zigaform Plugin

The Zigaform – Price Calculator & Cost Estimation Form Builder Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'zgfm_fvar' shortcode in all versions up to, and including, 7.4.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Zigaform

CVE-2024-13587

MEDIUM CVSS 6.4 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13582 - Pricing Tables Plugin

The Simple Pricing Tables For WPBakery Page Builder(Formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wdo_simple_pricing_table_free' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Pricing Tables

CVE-2024-13582

MEDIUM CVSS 6.4 2025-02-18
Threat Entry Updated 2025-02-21

CVE-2024-13581 - Simple Charts Plugin

The Simple Charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'simple_chart' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Simple Charts

CVE-2024-13581

MEDIUM CVSS 6.4 2025-02-18
Scroll to top