Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,897
Critical917
High3,023
Medium10,759
Reset
Showing 81-100 of 14897 records
Threat Entry Updated 2026-04-08

CVE-2026-1672 - Woo Bulk Editor Plugin

The BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.5. This is due to missing nonce validation on the woobe_redraw_table_row() function. This makes it possible for unauthenticated attackers to update WooCommerce product data including prices, descriptions, and other product fields via a forged request granted they can trick a site administrator or shop manager into performing an action such as clicking on a link.

PLUGIN Woo Bulk Editor

CVE-2026-1672

MEDIUM CVSS 6.5 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4303 - Wp Stats Manager Plugin

The WP Visitor Statistics (Real Time Traffic) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wsm_showDayStatsGraph' shortcode in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wp Stats Manager

CVE-2026-4303

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4300 - Robo Gallery Plugin

The Robo Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Loading Label' setting in all versions up to, and including, 5.1.3. The plugin uses a custom `|***...***|` marker pattern in its `fixJsFunction()` method to embed raw JavaScript function references within JSON-encoded configuration objects. When a gallery's options are rendered on the frontend, `json_encode()` wraps all string values in double quotes. The `fixJsFunction()` method then strips the `"|***` and `***|"` sequences, effectively converting a JSON string value into raw JavaScript code. The Loading Label field (stored as…

PLUGIN Robo Gallery

CVE-2026-4300

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4073 - Pdfl Io Plugin

The pdfl.io plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pdflio' shortcode in all versions up to, and including, 1.0.5. This is due to insufficient input sanitization and output escaping on the 'text' shortcode attribute. The output_shortcode() function directly concatenates the user-supplied $text variable into HTML output without applying esc_html() or any other escaping function. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Pdfl Io

CVE-2026-4073

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4025 - Privatecontent Free Plugin

The PrivateContent Free plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'align' shortcode attribute in the [pc-login-form] shortcode in all versions up to, and including, 1.2.0. This is due to insufficient input sanitization and output escaping on the 'align' attribute. Specifically, the attribute value flows from the shortcode through pc_login_form() to pc_static::form_align(), where it is directly concatenated into an HTML class attribute without esc_attr() or any escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that…

PLUGIN Privatecontent Free

CVE-2026-4025

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-13

CVE-2026-39614 - WordPress Core

Missing Authorization vulnerability in ilGhera JW Player for WordPress jw-player-7-for-wp allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects JW Player for WordPress: from n/a through

CORE WordPress Core

CVE-2026-39614

MEDIUM CVSS 5.4 2026-04-08
Threat Entry Updated 2026-04-13

CVE-2026-39466 - WordPress Core

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPMU DEV - Your All-in-One WordPress Platform Broken Link Checker broken-link-checker allows Blind SQL Injection.This issue affects Broken Link Checker: from n/a through

CORE WordPress Core

CVE-2026-39466

HIGH CVSS 7.6 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-1396 - Magic Conversation For Gravity Forms Plugin

The Magic Conversation For Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'magic-conversation' shortcode in all versions up to, and including, 3.0.97 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Magic Conversation For Gravity Forms

CVE-2026-1396

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4655 - Bdthemes Element Pack Lite Plugin

The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the SVG Image Widget in versions up to and including 8.4.2. This is due to insufficient input sanitization and output escaping on SVG content fetched from remote URLs in the render_svg() function. The function fetches SVG content using wp_safe_remote_get() and then directly echoes it to the page without any sanitization, only applying a preg_replace() to add attributes to the SVG tag which does not remove malicious event handlers. This makes it possible for authenticated…

PLUGIN Bdthemes Element Pack Lite

CVE-2026-4655

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4654 - Awesome Support Plugin

The Awesome Support – WordPress HelpDesk & Support Plugin plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 6.3.7. This is due to the wpas_get_ticket_replies_ajax() function failing to verify whether the authenticated user has permission to view the specific ticket being requested. This makes it possible for authenticated attackers, with subscriber-level access and above, to access sensitive information from all support tickets in the system by manipulating the ticket_id parameter.

PLUGIN Awesome Support

CVE-2026-4654

MEDIUM CVSS 5.3 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4330 - Blog2social Plugin

The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to authorization bypass through user-controlled key in all versions up to, and including, 8.8.3. This is due to the plugin's AJAX handlers failing to validate that the user-supplied 'b2s_id' parameter belongs to the current user before performing UPDATE and DELETE operations. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify, reschedule, or delete other users' scheduled social media posts.

PLUGIN Blog2social

CVE-2026-4330

MEDIUM CVSS 4.3 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-5508 - Wowpress Plugin

The WowPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `wowpress` shortcode in all versions up to, and including, 1.0.0. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wowpress

CVE-2026-5508

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-5506 - Wavr Plugin

The Wavr plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `wave` shortcode in all versions up to, and including, 0.2.6. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Wavr

CVE-2026-5506

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-5169 - Inquiry Form To Posts Or Pages Plugin

The Inquiry Form to Posts or Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Form Header' field in versions up to and including 1.0. This is due to insufficient input sanitization when saving via update_option() and lack of output escaping when displaying the stored value. The vulnerability exists in two locations: (1) the plugin settings page at inq_form.php line 180 where the value is echoed into an HTML attribute without esc_attr(), and (2) the front-end shortcode output at inquery_form_to_posts_or_pages.php line 139 where the value is output…

PLUGIN Inquiry Form To Posts Or Pages

CVE-2026-5169

MEDIUM CVSS 4.4 2026-04-08
Threat Entry Updated 2026-04-14

CVE-2026-4338 - Before 8 Plugin

The ActivityPub WordPress plugin before 8.0.2 does not properly filter posts to be displayed, allowed unauthenticated users to access drafts/scheduled/pending posts

PLUGIN Before 8

CVE-2026-4338

HIGH CVSS 7.5 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4808 - Gerador De Certificados Devapps Plugin

The Gerador de Certificados – DevApps plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the moveUploadedFile() function in all versions up to, and including, 1.3.6. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.

PLUGIN Gerador De Certificados Devapps

CVE-2026-4808

HIGH CVSS 7.2 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4871 - Sports Club Management Plugin

The Sports Club Management plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'before' and 'after' attributes of the `scm_member_data` shortcode in all versions up to, and including, 1.12.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Sports Club Management

CVE-2026-4871

MEDIUM CVSS 6.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-3781 - Attendance Manager Plugin

The Attendance Manager plugin for WordPress is vulnerable to SQL Injection via the 'attmgr_off' parameter in all versions up to, and including, 0.6.2. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Attendance Manager

CVE-2026-3781

MEDIUM CVSS 5.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-5167 - Learning Management System Plugin

The Masteriyo LMS – Online Course Builder for eLearning, LMS & Education plugin for WordPress is vulnerable to Authorization Bypass Through User-Controlled Key in versions up to and including 2.1.7. This is due to insufficient webhook signature verification in the handle_webhook() function. The webhook endpoint processes unauthenticated requests and only performs signature verification if both the webhook_secret setting is configured AND the HTTP_STRIPE_SIGNATURE header is present. Since webhook_secret defaults to an empty string, the webhook processes attacker-controlled JSON payloads without any verification. This makes it possible for unauthenticated attackers to…

PLUGIN Learning Management System

CVE-2026-5167

MEDIUM CVSS 5.3 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4141 - Quran Translations By Edc Plugin

The Quran Translations plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7. This is due to missing nonce validation in the quran_playlist_options() function that handles the plugin's settings page. The function processes POST requests to update plugin options via update_option() without any wp_nonce_field() in the form or wp_verify_nonce()/check_admin_referer() verification before processing. This makes it possible for unauthenticated attackers to modify plugin settings (toggling display options for PDF, RSS, podcast, media player links, playlist title, and playlist code) via a forged request granted…

PLUGIN Quran Translations By Edc

CVE-2026-4141

MEDIUM CVSS 4.3 2026-04-08
Scroll to top