Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 6961-6980 of 15036 records
Threat Entry Updated 2024-12-13

CVE-2024-12309 - Star Rating Plugin By Feedbackwp

The Rate My Post – Star Rating Plugin by FeedbackWP plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.2.4 via the get_post_status() due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to vote on unpublished scheduled posts.

PLUGIN Star Rating Plugin By Feedbackwp

CVE-2024-12309

MEDIUM CVSS 5.3 2024-12-13
Threat Entry Updated 2025-02-11

CVE-2024-11911 - Wp Crowdfunding Plugin

The WP Crowdfunding plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the install_woocommerce_plugin() function action in all versions up to, and including, 2.1.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install WooCommerce. This has a limited impact on most sites because WooCommerce is a requirement.

PLUGIN Wp Crowdfunding

CVE-2024-11911

MEDIUM CVSS 4.3 2024-12-13
Threat Entry Updated 2025-02-11

CVE-2024-11910 - Wp Crowdfunding Plugin

The WP Crowdfunding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the wp-crowdfunding/search block in all versions up to, and including, 2.1.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wp Crowdfunding

CVE-2024-11910

MEDIUM CVSS 6.4 2024-12-13
Threat Entry Updated 2025-01-07

CVE-2024-11832 - Beaver Builder Plugin

The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom JavaScript row settings in all versions up to, and including, 2.8.4.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Beaver Builder

CVE-2024-11832

MEDIUM CVSS 6.4 2024-12-13
Threat Entry Updated 2024-12-13

CVE-2024-11754 - Booking System Trafft Plugin

The Booking System Trafft plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'trafftbooking' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Booking System Trafft

CVE-2024-11754

MEDIUM CVSS 6.4 2024-12-13
Threat Entry Updated 2024-12-13

CVE-2024-11275 - Wp Timetics Ai Powered Appointment Booking Calendar And Online Scheduling Plugin

The WP Timetics- AI-powered Appointment Booking Calendar and Online Scheduling Plugin plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the /wp-json/timetics/v1/customers/ REST API endpoint in all versions up to, and including, 1.0.27. This makes it possible for authenticated attackers, with Timetics Customer access and above, to delete arbitrary users.

PLUGIN Wp Timetics Ai Powered Appointment Booking Calendar And Online Scheduling

CVE-2024-11275

MEDIUM CVSS 4.3 2024-12-13
Threat Entry Updated 2025-02-06

CVE-2024-12581 - Gutenberg Blocks With Ai Plugin

The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.2.53 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Gutenberg Blocks With Ai

CVE-2024-12581

MEDIUM CVSS 4.4 2024-12-13
Threat Entry Updated 2025-05-14

CVE-2024-10939 - Image Widget Plugin

The Image Widget WordPress plugin before 4.4.11 does not sanitise and escape some of its Image Widget settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

PLUGIN Image Widget

CVE-2024-10939

MEDIUM CVSS 4.8 2024-12-13
Threat Entry Updated 2025-05-08

CVE-2024-10678 - Ultimate Blocks Plugin

The Ultimate Blocks WordPress plugin before 3.2.4 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.

PLUGIN Ultimate Blocks

CVE-2024-10678

MEDIUM CVSS 5.4 2024-12-13
Threat Entry Updated 2024-12-13

CVE-2024-11809 - Primer Mydata For Woocommerce Plugin

The Primer MyData for Woocommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'img_src' parameter in all versions up to, and including, 4.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Primer Mydata For Woocommerce

CVE-2024-11809

MEDIUM CVSS 6.1 2024-12-13
Threat Entry Updated 2024-12-13

CVE-2024-12574 - Svg Shortcode Plugin

The SVG Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Svg Shortcode

CVE-2024-12574

MEDIUM CVSS 5.4 2024-12-13
Threat Entry Updated 2024-12-13

CVE-2024-12579 - Minify Html Plugin

The Minify HTML plugin for WordPress is vulnerable to Regular Expression Denial of Service (ReDoS) in all versions up to, and including, 2.1.10. This is due to processing user-supplied input as a regular expression. This makes it possible for unauthenticated attackers to create comments that can cause catastrophic backtracking and break pages.

PLUGIN Minify Html

CVE-2024-12579

MEDIUM CVSS 5.3 2024-12-13
Threat Entry Updated 2024-12-13

CVE-2024-11767 - Newsmanapp Plugin

The NewsmanApp plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'newsman_subscribe_widget' shortcode in all versions up to, and including, 2.7.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Newsmanapp

CVE-2024-11767

MEDIUM CVSS 6.4 2024-12-13
Threat Entry Updated 2024-12-13

CVE-2024-12572 - Hello In All Languages Plugin

The Hello In All Languages plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.6. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Hello In All Languages

CVE-2024-12572

MEDIUM CVSS 6.1 2024-12-13
Threat Entry Updated 2024-12-13

CVE-2024-12300 - Ar For Wordpress Plugin

The AR for WordPress plugin for WordPress is vulnerable to unauthorized double extension file upload due to a missing capability check on the set_ar_featured_image() function in all versions up to, and including, 7.3. This makes it possible for unauthenticated attackers to upload php files leveraging a double extension attack. It's important to note the file is deleted immediately and double extension attacks only work on select servers making this unlikely to be successfully exploited.

PLUGIN Ar For Wordpress

CVE-2024-12300

LOW CVSS 3.7 2024-12-13
Threat Entry Updated 2024-12-12

CVE-2024-12271 - 360deg Javascript Viewer Plugin

The 360 Javascript Viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ref’ parameter in all versions up to, and including, 1.7.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN 360deg Javascript Viewer

CVE-2024-12271

MEDIUM CVSS 4.4 2024-12-12
Threat Entry Updated 2024-12-12

CVE-2024-12333 - Woodmart Theme

The Woodmart theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.0.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode through the woodmart_instagram_ajax_query AJAX action. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

THEME Woodmart

CVE-2024-12333

MEDIUM CVSS 6.5 2024-12-12
Threat Entry Updated 2024-12-12

CVE-2024-11760 - Pro Plugin

The Currency Converter Widget ⚡ PRO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'currency-converter-widget-pro' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Pro

CVE-2024-11760

MEDIUM CVSS 6.4 2024-12-12
Threat Entry Updated 2024-12-12

CVE-2024-12160 - Seraphinite Discount For Woocommerce Plugin

The Seraphinite Bulk Discounts for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.4.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Seraphinite Discount For Woocommerce

CVE-2024-12160

MEDIUM CVSS 6.1 2024-12-12
Threat Entry Updated 2024-12-12

CVE-2024-12312 - Print Science Designer Plugin

The Print Science Designer plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.152 via deserialization of untrusted input through the 'designer-saved-projects' cookie. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

PLUGIN Print Science Designer

CVE-2024-12312

HIGH CVSS 8.1 2024-12-12
Scroll to top