Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total14,897
Critical917
High3,023
Medium10,759
Reset
Showing 121-140 of 14897 records
Threat Entry Updated 2026-04-08

CVE-2026-3499 - Product Feeds For Woocommerce Plugin

The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 13.4.6 through 13.5.2.1. This is due to missing or incorrect nonce validation on the ajax_migrate_to_custom_post_type, ajax_adt_clear_custom_attributes_product_meta_keys, ajax_update_file_url_to_lower_case, ajax_use_legacy_filters_and_rules, and ajax_fix_duplicate_feed functions. This makes it possible for unauthenticated attackers to trigger feed migration, clear custom-attribute transient caches, rewrite feed file URLs to lowercase, toggle legacy filter and rule settings, and delete duplicated feed posts via a forged request granted they can trick a site administrator into performing…

PLUGIN Product Feeds For Woocommerce

CVE-2026-3499

HIGH CVSS 8.8 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4394 - Gravity Forms Plugin

The Gravity Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Credit Card field's 'Card Type' sub-field (`input_.4`) in all versions up to, and including, 2.9.30. This is due to the `get_value_entry_detail()` method in the `GF_Field_CreditCard` class outputting the card type value without escaping, combined with `get_value_save_entry()` accepting and storing unsanitized user input for the `input_.4` parameter. The Card Type field is not rendered on the frontend form (it is normally derived from the card number), but the backend submission parser blindly accepts it if included in…

PLUGIN Gravity Forms

CVE-2026-4394

MEDIUM CVSS 6.1 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4401 - Download Monitor Plugin

The Download Monitor plugin for WordPress is vulnerable to Cross-Site Request Forgery in the `actions_handler()` and `bulk_actions_handler()` methods in `class-dlm-downloads-path.php` in all versions up to, and including, 5.1.10. This is due to missing nonce verification on these functions. This makes it possible for unauthenticated attackers to delete, disable, or enable approved download paths via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

PLUGIN Download Monitor

CVE-2026-4401

MEDIUM CVSS 5.4 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4406 - Gravity Forms Plugin

The Gravity Forms plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the `form_ids` parameter in the `gform_get_config` AJAX action in all versions up to, and including, 2.9.30. This is due to the `GFCommon::send_json()` method outputting JSON-encoded data wrapped in HTML comment delimiters using `echo` and `wp_die()`, which serves the response with a `Content-Type: text/html` header instead of `application/json`. The `wp_json_encode()` function does not HTML-encode angle brackets within JSON string values, allowing injected HTML/script tags in `form_ids` array values to be parsed and executed by the browser. The required…

PLUGIN Gravity Forms

CVE-2026-4406

MEDIUM CVSS 4.7 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-2263 - Wordpress Popup Plugin

The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'hustle_module_converted' AJAX action in all versions up to, and including, 7.8.10.2. This makes it possible for unauthenticated attackers to forge conversion tracking events for any Hustle module, including draft modules that are never displayed to users, thereby manipulating marketing analytics and conversion statistics.

PLUGIN Wordpress Popup

CVE-2026-2263

MEDIUM CVSS 5.3 2026-04-08
Threat Entry Updated 2026-04-08

CVE-2026-4065 - Smart Slider 3 Plugin

The Smart Slider 3 plugin for WordPress is vulnerable to unauthorized access and modification of data due to missing capability checks on multiple wp_ajax_smart-slider3 controller actions in all versions up to, and including, 3.5.1.33. The display_admin_ajax() method does not call checkForCap() (which requires unfiltered_html capability), and several controller actions only validate the nonce (validateToken()) without calling validatePermission(). This makes it possible for authenticated attackers, with Contributor-level access and above, to enumerate slider metadata and create, modify, and delete image storage records by obtaining the nextend_nonce exposed on post editor pages.

PLUGIN Smart Slider 3

CVE-2026-4065

MEDIUM CVSS 5.4 2026-04-07
Threat Entry Updated 2026-04-07

CVE-2026-3177 - Donation Plugin

The Charitable – Donation Plugin for WordPress – Fundraising with Recurring Donations & More plugin for WordPress is vulnerable to Insufficient Verification of Data Authenticity in versions up to, and including, 1.8.9.7. This is due to missing cryptographic verification of incoming Stripe webhook events. This makes it possible for unauthenticated attackers to forge payment_intent.succeeded webhook payloads and mark pending donations as completed without a real payment.

PLUGIN Donation

CVE-2026-3177

MEDIUM CVSS 5.3 2026-04-07
Threat Entry Updated 2026-04-07

CVE-2026-5465 - Ameliabooking Plugin

The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.3. This is due to the `UpdateProviderCommandHandler` failing to validate changes to the `externalId` field when a Provider (Employee) user updates their own profile. The `externalId` maps directly to a WordPress user ID and is passed to `wp_set_password()` and `wp_update_user()` without authorization checks. This makes it possible for authenticated attackers, with Provider-level (Employee) access and above, to take over any WordPress account — including…

PLUGIN Ameliabooking

CVE-2026-5465

HIGH CVSS 8.8 2026-04-07
Threat Entry Updated 2026-04-09

CVE-2026-4079 - Sql Chart Builder Plugin

The SQL Chart Builder WordPress plugin before 2.3.8 does not properly escape user input as it is concatened to SQL queries, making it possible for attackers to conduct SQL Injection attacks against the dynamic filter functionality.

PLUGIN Sql Chart Builder

CVE-2026-4079

MEDIUM CVSS 6.5 2026-04-07
Threat Entry Updated 2026-04-07

CVE-2026-0740 - Ninja Forms File Uploads Plugin

The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The vulnerability was partially patched in version 3.3.25 and fully patched in version 3.3.27.

PLUGIN Ninja Forms File Uploads

CVE-2026-0740

CRITICAL CVSS 9.8 2026-04-07
Threat Entry Updated 2026-04-07

CVE-2026-3666 - Wpforo Forum Plugin

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authenticated attackers, with subscriber level access and above, to delete arbitrary files on the server by embedding a crafted path traversal string in a forum post body and then deleting the post.

PLUGIN Wpforo Forum

CVE-2026-3666

HIGH CVSS 8.8 2026-04-04
Threat Entry Updated 2026-04-07

CVE-2026-2936 - Visitor Traffic Real Time Statistics Plugin

The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page_title' parameter in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an admin user accesses the Traffic by Title section.

PLUGIN Visitor Traffic Real Time Statistics

CVE-2026-2936

HIGH CVSS 7.2 2026-04-04
Threat Entry Updated 2026-04-07

CVE-2026-3309 - Profilepress Plugin

The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 4.16.11. This is due to the plugin allowing user-supplied billing field values from the checkout process to be interpolated into shortcode template strings that are subsequently processed without proper sanitization of shortcode syntax. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes by submitting crafted billing field values during the checkout process.

PLUGIN Profilepress

CVE-2026-3309

MEDIUM CVSS 6.5 2026-04-04
Threat Entry Updated 2026-04-07

CVE-2026-1233 - Changeset Plugin

The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the vendor's external telemetry server in the `Mementor_TTS_Remote_Telemetry` class. This makes it possible for unauthenticated attackers to extract and decode these credentials, gaining unauthorized write access to the vendor's telemetry database.

PLUGIN Changeset

CVE-2026-1233

HIGH CVSS 7.5 2026-04-04
Threat Entry Updated 2026-04-07

CVE-2026-0626 - Sales Plugin

The WPFunnels – Easy Funnel Builder To Optimize Buyer Journeys And Get More Leads & Sales plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpf_optin_form' shortcode in all versions up to, and including, 3.7.9 due to insufficient input sanitization and output escaping of the 'button_icon' parameter. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Sales

CVE-2026-0626

MEDIUM CVSS 6.4 2026-04-04
Threat Entry Updated 2026-04-07

CVE-2026-5425 - Widgets For Social Photo Feed Plugin

The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'feed_data' parameter keys in all versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Widgets For Social Photo Feed

CVE-2026-5425

HIGH CVSS 7.2 2026-04-04
Threat Entry Updated 2026-04-07

CVE-2026-3445 - Profilepress Plugin

The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to unauthorized membership payment bypass in all versions up to, and including, 4.16.11. This is due to a missing ownership verification on the `change_plan_sub_id` parameter in the `process_checkout()` function. This makes it possible for authenticated attackers, with subscriber level access and above, to reference another user's active subscription during checkout to manipulate proration calculations, allowing them to obtain paid lifetime membership plans without payment via the `ppress_process_checkout` AJAX…

PLUGIN Profilepress

CVE-2026-3445

HIGH CVSS 7.1 2026-04-04
Threat Entry Updated 2026-04-07

CVE-2026-2437 - Tour Operator Software Plugin

The WP Travel Engine – Tour Booking Plugin – Tour Operator Software plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wte_trip_tax' shortcode in all versions up to, and including, 6.7.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Tour Operator Software

CVE-2026-2437

MEDIUM CVSS 6.4 2026-04-04
Threat Entry Updated 2026-04-07

CVE-2026-2826 - Kadence Blocks Plugin

The Kadence Blocks — Page Builder Toolkit for Gutenberg Editor plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.6.3. This is due to the plugin not properly verifying that a user has the `upload_files` capability in the `process_pattern` REST API endpoint. This makes it possible for authenticated attackers, with contributor level access and above, to upload images to the WordPress Media Library by supplying remote image URLs that the server downloads and creates as media attachments.

PLUGIN Kadence Blocks

CVE-2026-2826

MEDIUM CVSS 4.3 2026-04-04
Scroll to top