Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 7541-7560 of 15036 records
Threat Entry Updated 2025-07-11

CVE-2024-10683 - Paypal Stripe Add On Plugin

The Contact Form 7 – PayPal & Stripe Add-on plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.3.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This is only exploitable when the leave a review notice is present in the dashboard.

PLUGIN Paypal Stripe Add On

CVE-2024-10683

MEDIUM CVSS 6.1 2024-11-09
Threat Entry Updated 2024-11-12

CVE-2024-8756 - Quform Wordpress Form Builder Plugin

The Quform - WordPress Form Builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.20.0 via the 'saveUploadedFile' function. This makes it possible for unauthenticated attackers to extract sensitive data, such as Personally Identifiable Information, from files uploaded by users. Files uploaded via forms created before version 2.21.0 will remain vulnerable to exposure after upgrading. To fully patch the plugin, site administrators should download any previously uploaded files, delete previously existing files and forms, and create the forms again after upgrading to…

PLUGIN Quform Wordpress Form Builder

CVE-2024-8756

MEDIUM CVSS 5.3 2024-11-09
Threat Entry Updated 2025-12-23

CVE-2024-10470 - Wordpress Learning Management System Plugin

The WPLMS Learning Management System for WordPress, WordPress LMS theme for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation and permissions checks in the readfile and unlink functions in all versions up to, and including, 4.962. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The theme is vulnerable even when it is not activated.

PLUGIN Wordpress Learning Management System

CVE-2024-10470

CRITICAL CVSS 9.8 2024-11-09
Threat Entry Updated 2024-11-12

CVE-2024-10814 - Simple Embed Code Plugin

The Code Embed plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.5 via the ce_get_file() function. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Simple Embed Code

CVE-2024-10814

MEDIUM CVSS 6.4 2024-11-09
Threat Entry Updated 2025-01-29

CVE-2024-10770 - Envo Extra Plugin

The Envo Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.9.3 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to.

PLUGIN Envo Extra

CVE-2024-10770

MEDIUM CVSS 4.3 2024-11-09
Threat Entry Updated 2024-11-12

CVE-2024-10669 - WordPress Core

The Countdown Timer block – Display the event's date into a timer. plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.4 via the [ctb] shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.

CORE WordPress Core

CVE-2024-10669

MEDIUM CVSS 4.3 2024-11-09
Threat Entry Updated 2024-11-12

CVE-2024-10667 - Content Slider Block Plugin

The Content Slider Block plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.1.5 via the [csb] shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.

PLUGIN Content Slider Block

CVE-2024-10667

MEDIUM CVSS 4.3 2024-11-09
Threat Entry Updated 2024-11-12

CVE-2024-9226 - Landing Page Cat Plugin

The Landing Page Cat – Coming Soon Page, Maintenance Page & Squeeze Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.7.6. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Landing Page Cat

CVE-2024-9226

MEDIUM CVSS 6.1 2024-11-09
Threat Entry Updated 2025-06-05

CVE-2024-10627 - Woocommerce Support Ticket System Plugin

The WooCommerce Support Ticket System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_manage_file_chunk_upload() function in all versions up to, and including, 17.7. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Woocommerce Support Ticket System

CVE-2024-10627

CRITICAL CVSS 9.8 2024-11-09
Threat Entry Updated 2024-11-12

CVE-2024-10674 - Th Shop Mania Theme

The Th Shop Mania theme for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the th_shop_mania_install_and_activate_callback() function in all versions up to, and including, 1.4.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install arbitrary plugins which can be leveraged to exploit other vulnerabilities and achieve remote code execution and privilege escalation.

THEME Th Shop Mania

CVE-2024-10674

HIGH CVSS 8.8 2024-11-09
Threat Entry Updated 2024-11-12

CVE-2024-10673 - Top Store Theme

The Top Store theme for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the top_store_install_and_activate_callback() function in all versions up to, and including, 1.5.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to install arbitrary plugins which can contain other exploitable vulnerabilities to elevate privileges and gain remote code execution.

THEME Top Store

CVE-2024-10673

HIGH CVSS 8.8 2024-11-09
Threat Entry Updated 2025-03-06

CVE-2024-10693 - Skt Addons For Elementor Plugin

The SKT Addons for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 3.3 via the Unfold widget due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to.

PLUGIN Skt Addons For Elementor

CVE-2024-10693

MEDIUM CVSS 4.3 2024-11-09
Threat Entry Updated 2025-05-28

CVE-2024-10625 - Woocommerce Support Ticket System Plugin

The WooCommerce Support Ticket System plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_tmp_uploaded_file() function in all versions up to, and including, 17.7. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Woocommerce Support Ticket System

CVE-2024-10625

CRITICAL CVSS 9.8 2024-11-09
Threat Entry Updated 2025-05-28

CVE-2024-10626 - Woocommerce Support Ticket System Plugin

The WooCommerce Support Ticket System plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_uploaded_file() function in all versions up to, and including, 17.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Woocommerce Support Ticket System

CVE-2024-10626

HIGH CVSS 8.8 2024-11-09
Threat Entry Updated 2024-11-12

CVE-2024-9270 - Lenxel Core Plugin

The Lenxel Core for Lenxel(LNX) LMS plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Lenxel Core

CVE-2024-9270

MEDIUM CVSS 6.4 2024-11-09
Threat Entry Updated 2024-11-26

CVE-2024-9775 - Anih Plugin

The Anih - Creative Agency WordPress Theme theme for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2024 due to an incomplete blacklist, insufficient input sanitization, and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Anih

CVE-2024-9775

MEDIUM CVSS 5.5 2024-11-09
Threat Entry Updated 2024-11-12

CVE-2024-9262 - User Meta Plugin

The User Meta – User Profile Builder and User management plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.1 via the getUser() due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to obtain user meta values from form fields. Please note that this requires a site administrator to create a form that displays potentially sensitive information like password hashes. This may also be exploited by unauthenticated users if…

PLUGIN User Meta

CVE-2024-9262

MEDIUM CVSS 6.5 2024-11-09
Threat Entry Updated 2025-01-29

CVE-2024-8960 - Cowidgets Elementor Addons Plugin

The Cowidgets – Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Cowidgets Elementor Addons

CVE-2024-8960

MEDIUM CVSS 6.4 2024-11-09
Threat Entry Updated 2025-01-29

CVE-2024-10779 - Cowidgets Elementor Addons Plugin

The Cowidgets – Elementor Addons plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.0 via the 'ce_template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to.

PLUGIN Cowidgets Elementor Addons

CVE-2024-10779

MEDIUM CVSS 5.3 2024-11-09
Threat Entry Updated 2024-11-12

CVE-2024-10588 - Debug Tool Plugin

The Debug Tool plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the info() function in all versions up to, and including, 2.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to obtain information from phpinfo(). When WP_DEBUG is enabled, this can be exploited by unauthenticated users as well.

PLUGIN Debug Tool

CVE-2024-10588

MEDIUM CVSS 4.3 2024-11-09
Scroll to top