Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total15,036
Critical923
High3,047
Medium10,866
Reset
Showing 8681-8700 of 15036 records
Threat Entry Updated 2024-11-21

CVE-2024-6164 - Before 2 Plugin

The Filter & Grids WordPress plugin before 2.8.33 is vulnerable to Local File Inclusion via the post_layout parameter. This makes it possible for an unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.

PLUGIN Before 2

CVE-2024-6164

CRITICAL CVSS 9.8 2024-07-18
Threat Entry Updated 2024-11-21

CVE-2023-6708 - Svg Support Plugin

The SVG Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the SVG upload feature in all versions up to, and including, 2.5.5 due to insufficient input sanitization and output escaping, even when the 'Sanitize SVG while uploading' feature is enabled. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note that successful exploitation of this vulnerability requires the administrator to allow author-level users to upload SVG files.

PLUGIN Svg Support

CVE-2023-6708

MEDIUM CVSS 5.4 2024-07-18
Threat Entry Updated 2024-11-21

CVE-2024-6705 - Reglevel Plugin

The RegLevel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Reglevel

CVE-2024-6705

MEDIUM CVSS 5.5 2024-07-18
Threat Entry Updated 2024-11-21

CVE-2024-6175 - Booking Ultra Pro Plugin

The Booking Ultra Pro Appointments Booking Calendar Plugin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the multiple functions in all versions up to, and including, 1.1.13. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify and delete. multiple plugin options and data such as payments, pricing, booking information, business hours, calendars, profile information, and email templates.

PLUGIN Booking Ultra Pro

CVE-2024-6175

MEDIUM CVSS 5.4 2024-07-18
Threat Entry Updated 2024-11-21

CVE-2024-6599 - Meks Video Importer Plugin

The Meks Video Importer plugin for WordPress is vulnerable to unauthorized API key modification due to a missing capability check on the ajax_save_settings function in all versions up to, and including, 1.0.11. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the plugin's API keys

PLUGIN Meks Video Importer

CVE-2024-6599

MEDIUM CVSS 4.3 2024-07-18
Threat Entry Updated 2024-11-21

CVE-2024-5726 - Timeline Event History Plugin

The Timeline Event History plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1 via deserialization of untrusted input 'timelines-data' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.

PLUGIN Timeline Event History

CVE-2024-5726

HIGH CVSS 8.8 2024-07-18
Threat Entry Updated 2024-11-21

CVE-2024-5964 - Zenon Lite Theme

The Zenon Lite theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter within the theme's Button shortcode in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

THEME Zenon Lite

CVE-2024-5964

MEDIUM CVSS 6.4 2024-07-18
Threat Entry Updated 2025-02-10

CVE-2024-39682 - Cooked Plugin

Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to HTML Injection in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary HTML in pages that will be shown whenever a user accesses a compromised page. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

PLUGIN Cooked

CVE-2024-39682

MEDIUM CVSS 6.4 2024-07-18
Threat Entry Updated 2025-02-10

CVE-2024-39681 - Cooked Plugin

Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

PLUGIN Cooked

CVE-2024-39681

MEDIUM CVSS 5.4 2024-07-18
Threat Entry Updated 2025-02-10

CVE-2024-39680 - Cooked Plugin

Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

PLUGIN Cooked

CVE-2024-39680

MEDIUM CVSS 5.4 2024-07-18
Threat Entry Updated 2025-02-10

CVE-2024-39679 - Cooked Plugin

Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

PLUGIN Cooked

CVE-2024-39679

MEDIUM CVSS 4.3 2024-07-18
Threat Entry Updated 2025-02-10

CVE-2024-39678 - Cooked Plugin

Cooked is a recipe plugin for WordPress. The Cooked plugin is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

PLUGIN Cooked

CVE-2024-39678

MEDIUM CVSS 4.3 2024-07-18
Threat Entry Updated 2024-11-21

CVE-2024-6220 - Keydatas Plugin

The 简数采集器 (Keydatas) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the keydatas_downloadImages function in all versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Keydatas

CVE-2024-6220

CRITICAL CVSS 9.8 2024-07-17
Threat Entry Updated 2024-11-21

CVE-2024-5582 - Schema Structured Data For Wp Amp Plugin

The Schema & Structured Data for WP & AMP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'url' attribute within the Q&A Block widget in all versions up to, and including, 1.33 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Schema Structured Data For Wp Amp

CVE-2024-5582

MEDIUM CVSS 6.4 2024-07-17
Threat Entry Updated 2024-11-21

CVE-2024-5703 - Email Subscribers Newsletters Plugin

The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to unauthorized API access due to a missing capability check in all versions up to, and including, 5.7.26. This makes it possible for authenticated attackers, with Subscriber-level access and above, to access the API (provided it is enabled) and add, edit, and delete audience users.

PLUGIN Email Subscribers Newsletters

CVE-2024-5703

MEDIUM CVSS 4.3 2024-07-17
Threat Entry Updated 2024-11-21

CVE-2024-6660 - Bookingpress Plugin

The BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the bookingpress_import_data_continue_process_func function in all versions up to, and including, 1.1.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site and upload arbitrary files. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain…

PLUGIN Bookingpress

CVE-2024-6660

HIGH CVSS 8.8 2024-07-17
Threat Entry Updated 2024-11-21

CVE-2024-6467 - Bookingpress Plugin

The BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin plugin for WordPress is vulnerable to Arbitrary File Read to Arbitrary File Creation in all versions up to, and including, 1.1.5 via the 'bookingpress_save_lite_wizard_settings_func' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create arbitrary files that contain the content of files on the server, allowing the execution of any PHP code in those files or the exposure of sensitive information.

PLUGIN Bookingpress

CVE-2024-6467

HIGH CVSS 8.8 2024-07-17
Threat Entry Updated 2024-11-21

CVE-2024-5255 - Ultimate Addons For Wpbakery Page Builder Plugin

The Ultimate Addons for WPBakery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's ultimate_dual_color shortcode in all versions up to, and including, 3.19.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Ultimate Addons For Wpbakery Page Builder

CVE-2024-5255

MEDIUM CVSS 6.4 2024-07-17
Threat Entry Updated 2025-05-12

CVE-2024-6669 - Wpbot Plugin

The AI ChatBot for WordPress – WPBot plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 5.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

PLUGIN Wpbot

CVE-2024-6669

MEDIUM CVSS 5.5 2024-07-17
Threat Entry Updated 2024-11-21

CVE-2024-6033 - Eventin Plugin

The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to unauthorized data importation due to a missing capability check on the 'import_file' function in all versions up to, and including, 4.0.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to import events, speakers, schedules and attendee data.

PLUGIN Eventin

CVE-2024-6033

MEDIUM CVSS 4.3 2024-07-17
Scroll to top