Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,897
Critical917
High3,023
Medium10,759
Reset
Showing 61-80 of 14897 records
Threat Entry Updated 2026-04-13

CVE-2026-5742 - Userswp Plugin

The UsersWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to and including 1.2.60. This is due to insufficient input sanitization of user-supplied URL fields and improper output escaping when rendering user profile data in badge widgets. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts that will execute whenever a user accesses a page containing the affected badge widget.

PLUGIN Userswp

CVE-2026-5742

MEDIUM CVSS 6.4 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-4336 - Ultimate Faqs Plugin

The Ultimate FAQ Accordion plugin for WordPress is vulnerable to Stored Cross-Site Scripting via FAQ content in all versions up to, and including, 2.4.7. This is due to the plugin calling html_entity_decode() on post_content during rendering in the set_display_variables() function (View.FAQ.class.php, line 746), which converts HTML entity-encoded payloads back into executable HTML, combined with insufficient output escaping in the faq-answer.php template where the decoded content is echoed without wp_kses_post() or any other sanitization. The ufaq custom post type is registered with 'show_in_rest' => true and defaults to 'post' capability_type, allowing…

PLUGIN Ultimate Faqs

CVE-2026-4336

MEDIUM CVSS 6.4 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-1830 - Quick Playground Plugin

The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file uploads. This makes it possible for unauthenticated attackers to retrieve the sync code, upload PHP files with path traversal, and achieve remote code execution on the server.

PLUGIN Quick Playground

CVE-2026-1830

CRITICAL CVSS 9.8 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-5357 - Download Manager Plugin

The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sid' parameter of the 'wpdm_members' shortcode in versions up to and including 3.3.52. This is due to insufficient input sanitization and output escaping on the user-supplied 'sid' shortcode attribute. The sid parameter is extracted without sanitization in the members() function and stored via update_post_meta(), then echoed directly into an HTML id attribute in the members.php template without applying esc_attr(). This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts…

PLUGIN Download Manager

CVE-2026-5357

MEDIUM CVSS 6.4 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-4429 - Osm Plugin

The OSM – OpenStreetMap plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'marker_name' and 'file_color_list' shortcode attribute of the [osm_map_v3] shortcode in all versions up to and including 6.1.15. This is due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Osm

CVE-2026-4429

MEDIUM CVSS 6.4 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-4124 - Ziggeo Plugin

The Ziggeo plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.1.1. The wp_ajax_ziggeo_ajax handler only verifies a nonce (check_ajax_referer) but performs no capability checks via current_user_can(). Furthermore, the nonce ('ziggeo_ajax_nonce') is exposed to all logged-in users on every page via the wp_head and admin_head hooks . This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke multiple administrative operations including: saving arbitrary translation strings (translations_panel_save_strings via update_option('ziggeo_translations')), creating/updating/deleting event templates (event_editor_save_template/update_template/remove_template via update_option('ziggeo_events')), modifying SDK application settings (sdk_applications operations),…

PLUGIN Ziggeo

CVE-2026-4124

MEDIUM CVSS 5.4 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-3574 - Experto Custom Dashboard Plugin

The Experto Dashboard for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's settings fields (including 'Navigation Font Size', 'Navigation Font Weight', 'Heading Font Size', 'Heading Font Weight', 'Text Font Size', and 'Text Font Weight') in all versions up to and including 1.0.4. This is due to insufficient input sanitization (no sanitize callback in register_setting()) and missing output escaping (no esc_attr() in the field_callback() printf output) on user-supplied values. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts…

PLUGIN Experto Custom Dashboard

CVE-2026-3574

MEDIUM CVSS 4.4 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-3568 - Mstore Api Plugin

The MStore API plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.18.3. This is due to the update_user_profile() function in controllers/flutter-user.php processing the 'meta_data' JSON parameter without any allowlist, blocklist, or validation of meta keys. The function reads raw JSON from php://input (line 1012), decodes it (line 1013), authenticates the user via cookie validation (line 1015), and then directly iterates over the user-supplied meta_data array passing arbitrary keys and values to update_user_meta() (line 1080) with no sanitization or restrictions. This makes…

PLUGIN Mstore Api

CVE-2026-3568

MEDIUM CVSS 4.3 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-4326 - Addons For Elementor Builder Plugin

The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. This is due to improper authorization enforcement in the activate_required_plugins() function. Specifically, the current_user_can('install_plugins') capability check does not terminate execution when it fails — it only sets an error message variable while allowing the plugin installation and activation code to execute. The error response is only sent after the installation and activation have already completed. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install…

PLUGIN Addons For Elementor Builder

CVE-2026-4326

HIGH CVSS 8.8 2026-04-09
Threat Entry Updated 2026-04-13

CVE-2026-5711 - Bnm Blocks Plugin

The Post Blocks & Tools plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sliderStyle' block attribute in the Posts Slider block in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Bnm Blocks

CVE-2026-5711

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-5436 - Mw Wp Form Plugin

The MW WP Form plugin for WordPress is vulnerable to Arbitrary File Move/Read in all versions up to and including 5.1.1. This is due to insufficient validation of the $name parameter (upload field key) passed to the generate_user_file_dirpath() function, which uses WordPress's path_join() — a function that returns absolute paths unchanged, discarding the intended base directory. The attacker-controlled key is injected via the mwf_upload_files[] POST parameter, which is loaded into the plugin's Data model via _set_request_valiables(). During form processing, regenerate_upload_file_keys() iterates over these keys and calls generate_user_filepath() with the attacker-supplied…

PLUGIN Mw Wp Form

CVE-2026-5436

HIGH CVSS 8.1 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-5451 - Extensions Leaflet Map Plugin

The Extensions for Leaflet Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'elevation-track' shortcode in all versions up to, and including, 4.14. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Extensions Leaflet Map

CVE-2026-5451

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-2942 - Prosolution Wp Client Plugin

The ProSolution WP Client plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'proSol_fileUploadProcess' function in all versions up to, and including, 1.9.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Prosolution Wp Client

CVE-2026-2942

CRITICAL CVSS 9.8 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-0811 - Advanced Cf7 Db Plugin

The Advanced Contact form 7 DB plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.9. This is due to missing or incorrect nonce validation on the 'vsz_cf7_save_setting_callback' function. This makes it possible for unauthenticated attackers to delete form entry via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Advanced Cf7 Db

CVE-2026-0811

MEDIUM CVSS 5.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-0814 - Advanced Cf7 Db Plugin

The Advanced Contact form 7 DB plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'vsz_cf7_export_to_excel' function in all versions up to, and including, 2.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export form submissions to excel file.

PLUGIN Advanced Cf7 Db

CVE-2026-0814

MEDIUM CVSS 4.3 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-2509 - Pagelayer Plugin

The Page Builder: Pagelayer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Button widget's Custom Attributes field in all versions up to, and including, 2.0.8. This is due to an incomplete event handler blocklist in the 'pagelayer_xss_content' XSS filtering function, which blocks common, but not all, event handlers. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Pagelayer

CVE-2026-2509

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-3243 - Advanced Members Plugin

The Advanced Members for ACF plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the create_crop function in all versions up to, and including, 1.2.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The vulnerability was partially patched in version 1.2.5.

PLUGIN Advanced Members

CVE-2026-3243

HIGH CVSS 8.8 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-2481 - Drag And Drop Website Builder Plugin

The Beaver Builder Page Builder – Drag and Drop Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'settings[js]' parameter in versions up to, and including, 2.10.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Drag And Drop Website Builder

CVE-2026-2481

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-1865 - Login Builder Plugin

The User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder plugin for WordPress is vulnerable to SQL Injection via the ‘membership_ids[]’ parameter in all versions up to, and including, 5.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from…

PLUGIN Login Builder

CVE-2026-1865

MEDIUM CVSS 6.5 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-1673 - Woo Bulk Editor Plugin

The BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.5. This is due to missing nonce validation on the woobe_delete_tax_term() function. This makes it possible for unauthenticated attackers to delete WooCommerce taxonomy terms (categories, tags, etc.) via a forged request granted they can trick a site administrator or shop manager into performing an action such as clicking on a link.

PLUGIN Woo Bulk Editor

CVE-2026-1673

MEDIUM CVSS 4.3 2026-04-08
Scroll to top