Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 8061-8080 of 15036 records
Threat Entry Updated 2025-07-10

CVE-2024-8771 - Email Subscribers Newsletters Plugin

The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'preview_email_template_design' function in all versions up to, and including, 5.7.34. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive data including the content of private, password protected, pending, and draft posts and pages.

PLUGIN Email Subscribers Newsletters

CVE-2024-8771

MEDIUM CVSS 4.3 2024-09-26
Threat Entry Updated 2024-10-03

CVE-2024-9177 - Toolbox Plugin

The Themedy Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's themedy_col, themedy_social_link, themedy_alertbox, and themedy_pullleft shortcodes in all versions up to, and including, 1.0.14, and up to, and including 1.0.15 for the plugin's themedy_button shortcode due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Toolbox

CVE-2024-9177

MEDIUM CVSS 6.4 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-8633 - Form Maker Plugin

The Form Maker by 10Web – Mobile-Friendly Drag & Drop Contact Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.15.27 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Form Maker

CVE-2024-8633

MEDIUM CVSS 5.5 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-8126 - Advanced File Manager Plugin

The Advanced File Manager plugin for WordPress is vulnerable to arbitrary file uploads via the 'class_fma_connector.php' file in all versions up to, and including, 5.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload a new .htaccess file allowing them to subsequently upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Advanced File Manager

CVE-2024-8126

HIGH CVSS 7.5 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-8704 - Advanced File Manager Plugin

The Advanced File Manager plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 5.2.8 via the 'fma_locale' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.

PLUGIN Advanced File Manager

CVE-2024-8704

HIGH CVSS 7.2 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-8725 - Advanced File Manager Plugin

Multiple plugins and/or themes for WordPress are vulnerable to Limited File Upload in various versions. This is due to a lack of proper checks to ensure lower-privileged roles cannot upload .css and .js files to arbitrary directories. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an administrator, to upload .css and .js files to any directory within the WordPress root directory, which could lead to Stored Cross-Site Scripting. The Advanced File Manager Shortcodes plugin must be installed to exploit this vulnerability.

PLUGIN Advanced File Manager

CVE-2024-8725

MEDIUM CVSS 6.8 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-9173 - Gf Custom Style Plugin

The GF Custom Style plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Gf Custom Style

CVE-2024-9173

MEDIUM CVSS 6.4 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-9127 - Super Testimonials Plugin

The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘alignment’ parameter in all versions up to, and including, 3.0.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Super Testimonials

CVE-2024-9127

MEDIUM CVSS 6.4 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-9125 - King Ie Plugin

The king_IE plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN King Ie

CVE-2024-9125

MEDIUM CVSS 6.4 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-9117 - Mapplic Plugin

The Mapplic Lite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Mapplic

CVE-2024-9117

MEDIUM CVSS 6.4 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-9115 - Common Tools For Site Plugin

The Common Tools for Site plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.

PLUGIN Common Tools For Site

CVE-2024-9115

MEDIUM CVSS 6.4 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-8872 - Store Hours For Woocommerce Plugin

The Store Hours for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.3.20. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Store Hours For Woocommerce

CVE-2024-8872

MEDIUM CVSS 6.1 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-9025 - Sight Plugin

The Sight – Professional Image Gallery and Portfolio plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'handler_post_title' function in all versions up to, and including, 1.1.2. This makes it possible for unauthenticated attackers to expose private, pending, trashed, and draft post titles. Successful exploitation requires the Elementor plugin to be installed and activated.

PLUGIN Sight

CVE-2024-9025

MEDIUM CVSS 5.3 2024-09-26
Threat Entry Updated 2024-10-01

CVE-2024-8861 - Profilegrid Plugin

The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 5.9.3.2 due to incorrect use of the wp_kses_allowed_html function, which allows the 'onclick' attribute for certain HTML elements without sufficient restriction or context validation. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Profilegrid

CVE-2024-8861

MEDIUM CVSS 6.4 2024-09-26
Threat Entry Updated 2025-03-14

CVE-2024-6517 - Contact Form 7 Math Captcha Plugin

The Contact Form 7 Math Captcha WordPress plugin through 2.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users.

PLUGIN Contact Form 7 Math Captcha

CVE-2024-6517

MEDIUM CVSS 6.1 2024-09-26
Threat Entry Updated 2024-10-02

CVE-2024-7772 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file uploads due to a mishandled file type validation in the 'validate' function in all versions up to, and including, 4.6.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Jupiter X Core

CVE-2024-7772

CRITICAL CVSS 9.8 2024-09-26
Threat Entry Updated 2024-10-02

CVE-2024-7781 - Jupiter X Core Plugin

The Jupiter X Core plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 4.7.5. This is due to improper authentication via the Social Login widget. This makes it possible for unauthenticated attackers to log in as the first user to have logged in with a social media account, including administrator accounts. Attackers can exploit the vulnerability even if the Social Login element has been disabled, as long as it was previously enabled and used. The vulnerability was partially patched in version 4.7.5, and fully…

PLUGIN Jupiter X Core

CVE-2024-7781

HIGH CVSS 8.1 2024-09-26
Threat Entry Updated 2024-10-02

CVE-2024-8723 - 012 Ps Multi Languages Plugin

The 012 Ps Multi Languages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via translated titles in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN 012 Ps Multi Languages

CVE-2024-8723

MEDIUM CVSS 6.4 2024-09-26
Threat Entry Updated 2024-10-02

CVE-2024-8803 - Bulk Noindex Nofollow Toolkit Plugin

The Bulk NoIndex & NoFollow Toolkit plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.15. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

PLUGIN Bulk Noindex Nofollow Toolkit

CVE-2024-8803

MEDIUM CVSS 6.1 2024-09-26
Threat Entry Updated 2024-10-02

CVE-2024-8552 - Download Monitor Plugin

The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the enable_shop() function in all versions up to, and including, 5.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to enable shop functionality.

PLUGIN Download Monitor

CVE-2024-8552

MEDIUM CVSS 4.3 2024-09-26
Scroll to top