Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 8401-8420 of 15036 records
Threat Entry Updated 2024-08-21

CVE-2024-6767 - Wordsurvey Plugin

The WordSurvey plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘sounding_title’ parameter in all versions up to, and including, 3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Wordsurvey

CVE-2024-6767

MEDIUM CVSS 5.5 2024-08-21
Threat Entry Updated 2024-08-21

CVE-2024-6568 - Flamix Bitrix24 And Contact Forms 7 Integrations Plugin

The Flamix: Bitrix24 and Contact Form 7 integrations plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 3.1.0. This is due the plugin utilizing mobiledetect without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.

PLUGIN Flamix Bitrix24 And Contact Forms 7 Integrations

CVE-2024-6568

MEDIUM CVSS 5.3 2024-08-21
Threat Entry Updated 2024-08-21

CVE-2024-5880 - Hide My Site Plugin

The Hide My Site plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2 due to the plugin not restricting access to the REST API when password protection is enabled. This makes it possible for unauthenticated attackers to gain unauthorized access to the site.

PLUGIN Hide My Site

CVE-2024-5880

MEDIUM CVSS 4.3 2024-08-21
Threat Entry Updated 2025-03-31

CVE-2024-7054 - Popup Maker Plugin

The Popup Maker – Boost Sales, Conversions, Optins, Subscribers with the Ultimate WP Popups Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘close_text’ parameter in all versions up to, and including, 1.19.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Popup Maker

CVE-2024-7054

MEDIUM CVSS 6.4 2024-08-20
Threat Entry Updated 2025-05-27

CVE-2024-6847 - Chatbot With Chatgpt Plugin

The Chatbot with ChatGPT WordPress plugin before 2.4.5 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users when submitting messages to the chatbot.

PLUGIN Chatbot With Chatgpt

CVE-2024-6847

CRITICAL CVSS 9.8 2024-08-20
Threat Entry Updated 2025-01-29

CVE-2024-5576 - Tutor Lms Elementor Addons Plugin

The Tutor LMS Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'course_carousel_skin' attribute within the plugin's Course Carousel widget in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Tutor Lms Elementor Addons

CVE-2024-5576

MEDIUM CVSS 6.4 2024-08-20
Threat Entry Updated 2024-09-03

CVE-2024-6864 - Wp Last Modified Info Plugin

The WP Last Modified Info plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘template’ attribute of the lmt-post-modified-info shortcode in all versions up to, and including, 1.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wp Last Modified Info

CVE-2024-6864

MEDIUM CVSS 6.4 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-7782 - Contact Form Builder Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the iconRemove function in versions 2.0 to 2.13.4. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Contact Form Builder

CVE-2024-7782

HIGH CVSS 8.7 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-7777 - Contact Form Builder Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation in multiple functions in versions 2.0 to 2.13.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to read and delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

PLUGIN Contact Form Builder

CVE-2024-7777

CRITICAL CVSS 9.0 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-7780 - Contact Form Builder Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the id parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Contact Form Builder

CVE-2024-7780

HIGH CVSS 7.2 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-7775 - Contact Form Builder Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to arbitrary JavaScript file uploads due to missing input validation in the addCustomCode function in versions 2.0 to 2.13.9. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary JavaScript files to the affected site's server.

PLUGIN Contact Form Builder

CVE-2024-7775

MEDIUM CVSS 5.5 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-7702 - Contact Form Builder Plugin

The Contact Form by Bit Form: Multi Step Form, Calculation Contact Form, Payment Contact Form & Custom Contact Form builder plugin for WordPress is vulnerable to generic SQL Injection via the entryID parameter in versions 2.0 to 2.13.9 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries to already existing queries that can be used to extract sensitive information from the database.

PLUGIN Contact Form Builder

CVE-2024-7702

HIGH CVSS 7.2 2024-08-20
Threat Entry Updated 2024-09-03

CVE-2024-6575 - Plus Addons For Elementor Plugin

The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘res_width_value’ parameter within the plugin's tp_page_scroll widget in all versions up to, and including, 5.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Plus Addons For Elementor

CVE-2024-6575

MEDIUM CVSS 6.4 2024-08-20
Threat Entry Updated 2024-09-03

CVE-2024-5763 - Plus Addons For Elementor Plugin

The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the video_date attribute within the plugin's Video widget in all versions up to, and including, 5.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Plus Addons For Elementor

CVE-2024-5763

MEDIUM CVSS 6.4 2024-08-20
Threat Entry Updated 2024-08-20

CVE-2024-7827 - Ecommerce Store Plugin

The Shopping Cart & eCommerce Store plugin for WordPress is vulnerable to boolean-based SQL Injection via the ‘model_number’ parameter in all versions up to, and including, 5.7.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Ecommerce Store

CVE-2024-7827

HIGH CVSS 8.8 2024-08-20
Threat Entry Updated 2024-08-20

CVE-2024-7850 - Bp Profile Search Plugin

The BP Profile Search plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.7.5. This is due to missing or incorrect nonce validation on the bps_ajax_field_selector(), bps_ajax_template_options(), and bps_ajax_field_row() functions. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Bp Profile Search

CVE-2024-7850

MEDIUM CVSS 6.1 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-5941 - Givewp Plugin

The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized access and deletion of data due to a missing capability check on the 'handle_request' function in all versions up to, and including, 3.14.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read attachment paths and delete attachment files.

PLUGIN Givewp

CVE-2024-5941

MEDIUM CVSS 5.4 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-5932 - Givewp Plugin

The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.14.1 via deserialization of untrusted input from the 'give_title' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to execute code remotely, and to delete arbitrary files.

PLUGIN Givewp

CVE-2024-5932

CRITICAL CVSS 10.0 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-5940 - Givewp Plugin

The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'handle_request' function in all versions up to, and including, 3.13.0. This makes it possible for unauthenticated attackers to edit event ticket settings if the Events beta feature is enabled.

PLUGIN Givewp

CVE-2024-5940

MEDIUM CVSS 6.5 2024-08-20
Threat Entry Updated 2024-08-26

CVE-2024-5939 - Givewp Plugin

The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'setup_wizard' function in all versions up to, and including, 3.13.0. This makes it possible for unauthenticated attackers to read the setup wizard administrative pages.

PLUGIN Givewp

CVE-2024-5939

MEDIUM CVSS 5.3 2024-08-20
Scroll to top