π‘ Did you know?
You can scan your WordPress site in real-time with the VulnTitan Free Plugin.
Need scheduled scans, email alerts, and smart patch suggestions? Upgrade to VulnTitan Pro.
π‘οΈ Latest Vulnerabilities
-
The EZ SQL Reports Shortcode Widget and DB Backup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's SQLREPORT shortcode in all versions up to, and including, 5.25.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
ποΈ Published: Jun 28, 2025 π§© Slug: elisqlreports π CVSS: 6.4/10 π‘οΈ CVE: CVE-2025-6462β οΈ Affected Versions: β₯ * & β€ 5.25.11β Patched in: 5.25.25Plugin Read Full Report β -
The MicroPayments β Fans Paysite: Paid Creator Subscriptions, Digital Assets, Wallet plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.0. This is due to missing or incorrect nonce validation on the adminOptions() function. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
ποΈ Published: Jun 27, 2025 π§© Slug: paid-membership π CVSS: 4.3/10 π‘οΈ CVE: CVE-2025-5937β οΈ Affected Versions: β₯ * & β€ 3.2.0β Patched in: 3.2.1Plugin Read Full Report β -
The Game Users Share Buttons plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the ajaxDeleteTheme() function in all versions up to, and including, 1.3.0. This makes it possible for Subscriber-level attackers to add arbitrary file paths (such as ../../../../wp-config.php) to the themeNameId parameter of the AJAX request, which can lead to remote code execution.
ποΈ Published: Jun 27, 2025 π§© Slug: game-users-share-buttons π CVSS: 8.8/10 π‘οΈ CVE: CVE-2025-6755β οΈ Affected Versions: β₯ * & β€ 1.3.0β Not patchedPlugin Read Full Report β -
The PT Project Notebooks plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the wpnb_pto_new_users_add() function in versions 1.0.0 through 1.1.3. This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator.
ποΈ Published: Jun 27, 2025 π§© Slug: project-notebooks π CVSS: 9.8/10 π‘οΈ CVE: CVE-2025-5304β οΈ Affected Versions: β₯ 1.0.0 & β€ 1.1.3β Not patchedPlugin Read Full Report β -
The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in all versions up to, and including, 1.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
ποΈ Published: Jun 27, 2025 π§© Slug: qi-addons-for-elementor π CVSS: 6.4/10 π‘οΈ CVE: CVE-2025-6252β οΈ Affected Versions: β₯ * & β€ 1.9.1β Patched in: 1.9.2Plugin Read Full Report β -
The WP VR β 360 Panorama and Free Virtual Tour Builder For WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the βhotspot-hoverβ parameter in all versions up to, and including, 8.5.32 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
β οΈ Affected Versions: β₯ * & β€ 8.5.32β Patched in: 8.5.33Plugin Read Full Report β -
The BeeTeam368 Extensions Pro plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_live_fn() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.
ποΈ Published: Jun 27, 2025 π§© Slug: beeteam368-extensions-pro π CVSS: 8.8/10 π‘οΈ CVE: CVE-2025-6379β οΈ Affected Versions: β₯ * & β€ 2.3.4β Patched in: 2.3.5Plugin Read Full Report β -
The BeeTeam368 Extensions plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.3.4 via the handle_remove_temp_file() function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory. This vulnerability can be used to delete the wp-config.php file, which can be leveraged into a site takeover.
ποΈ Published: Jun 27, 2025 π§© Slug: beeteam368-extensions π CVSS: 8.8/10 π‘οΈ CVE: CVE-2025-6381β οΈ Affected Versions: β₯ * & β€ 2.3.4β Patched in: 2.3.5Plugin Read Full Report β -
The The Pack Elementor addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the βslider_optionsβ parameter in all versions up to, and including, 2.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
ποΈ Published: Jun 26, 2025 π§© Slug: the-pack-addon π CVSS: 6.4/10 π‘οΈ CVE: CVE-2025-6550β οΈ Affected Versions: β₯ * & β€ 2.1.3β Not patchedPlugin Read Full Report β -
The Osom Blocks β Custom Post Type listing block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the βclass_nameβ parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
β οΈ Affected Versions: β₯ * & β€ 1.2.1β Not patchedPlugin Read Full Report β