VulnTitan

VulnTitan

The WordPress Vulnerability Index

💡 Did you know?

You can scan your WordPress site in real-time with the VulnTitan Free Plugin. Need scheduled scans, email alerts, and smart patch suggestions? Upgrade to VulnTitan Pro.

🛡️ Latest Vulnerabilities

  • The Contest Gallery – Upload, Vote & Sell with PayPal and Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple form field parameters in all versions up to, and including, 27.0.2. This is due to insufficient input sanitization and output escaping on user-supplied attributes. This makes it possible for authenticated attackers, with author-level access or higher, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    🗓️ Published: Oct 03, 2025 🧩 Slug: contest-gallery 📊 CVSS: 6.4/10 🛡️ CVE: CVE-2025-10383
    ⚠️ Affected Versions: ≥ * & ≤ 27.0.2
    ✅ Patched in: 27.0.3
  • The Trinity Audio – Text to Speech AI audio player to convert content into audio plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'range-date' parameter in all versions up to, and including, 5.20.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

    🗓️ Published: Oct 03, 2025 🧩 Slug: trinity-audio 📊 CVSS: 6.1/10 🛡️ CVE: CVE-2025-9952
    ⚠️ Affected Versions: ≥ * & ≤ 5.20.2
    ✅ Patched in: 5.21.0
  • The Integrate Dynamics 365 CRM plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 1.0.9. This is due to missing capability checks and nonce verification on functions hooked to 'init'. This makes it possible for unauthenticated attackers to deactivate the plugin, tamper with OAuth configuration, and trigger test connections that expose sensitive data via direct request to vulnerable endpoints granted they can craft malicious requests with specific parameters.

    🗓️ Published: Oct 03, 2025 🧩 Slug: integrate-dynamics-365-crm 📊 CVSS: 6.5/10 🛡️ CVE: CVE-2025-10746
    ⚠️ Affected Versions: ≥ * & ≤ 1.0.9
    ✅ Patched in: 1.1.0
  • The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.10.0 via the 'registerGetForm', 'registerGetForms', 'registerGetCampaign' and 'registerGetCampaigns' functions due to a missing capability check. This makes it possible for unauthenticated attackers to extract data from private and draft donation forms, as well as archived campaigns.

    🗓️ Published: Oct 03, 2025 🧩 Slug: give 📊 CVSS: 6.5/10 🛡️ CVE: CVE-2025-11227
    ⚠️ Affected Versions: ≥ * & ≤ 4.10.0
    ✅ Patched in: 4.10.1
  • The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `registerAssociateFormsWithCampaign` function in all versions up to, and including, 4.10.0. This makes it possible for unauthenticated attackers to associate any donation forms with any campaign.

    🗓️ Published: Oct 03, 2025 🧩 Slug: give 📊 CVSS: 5.3/10 🛡️ CVE: CVE-2025-11228
    ⚠️ Affected Versions: ≥ * & ≤ 4.10.0
    ✅ Patched in: 4.10.1
  • The OAuth Single Sign On – SSO (OAuth Client) plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature in versions up to, and including, 6.26.12. This is due to the plugin performing unsafe JWT token processing without verification or validation in the `get_resource_owner_from_id_token` function. This makes it possible for unauthenticated attackers to bypass authentication and gain access to any existing user account - including administrators in certain configurations - or to create arbitrary subscriber-level accounts.

    🗓️ Published: Oct 03, 2025 🧩 Slug: miniorange-login-with-eve-online-google-facebook 📊 CVSS: 9.8/10 🛡️ CVE: CVE-2025-9485
    ⚠️ Affected Versions: ≥ * & ≤ 6.26.12
    ✅ Patched in: 6.26.13
  • The Cost Calculator Builder plugin for WordPress is vulnerable to unauthorizedmodification of data due to a missing capability check on the get_cc_orders and update_order_status functions in all versions up to, and including, 3.5.32. This makes it possible for authenticated attackers, with Subscriber-level access and above, to access order management functions and modify order status.

    🗓️ Published: Oct 03, 2025 🧩 Slug: cost-calculator-builder 📊 CVSS: 8.1/10 🛡️ CVE: CVE-2025-9243
    ⚠️ Affected Versions: ≥ * & ≤ 3.5.32
    ✅ Patched in: 3.5.33
  • The Majestic Before After Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'before_label' and 'after_label' parameters in versions less than, or equal to, 2.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    🗓️ Published: Oct 03, 2025 🧩 Slug: majestic-before-after-image 📊 CVSS: 5.4/10 🛡️ CVE: CVE-2025-9030
    ⚠️ Affected Versions: ≥ * & ≤ 2.0.2
    ✅ Patched in: 2.0.3
  • The WDesignKit – Elementor & Gutenberg Starter Templates, Patterns, Cloud Workspace & Widget Builder plugin for WordPress is vulnerable to missing authorization via the wdkit_handle_review_submission function in versions less than, or equal to, 1.2.16. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to submit feedback data to external services.

    🗓️ Published: Oct 03, 2025 🧩 Slug: wdesignkit 📊 CVSS: 4.3/10 🛡️ CVE: CVE-2025-9029
    ⚠️ Affected Versions: ≥ * & ≤ 1.2.16
    ✅ Patched in: 1.2.17
  • The WP Photo Album Plus plugin for WordPress is vulnerable to Cross-Site Scripting in all versions up to, and including, 9.0.11.006 due to insufficient input sanitization and output escaping in the wppa_user_upload function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in the photo album descriptions that execute in a victim's browser.

    🗓️ Published: Oct 03, 2025 🧩 Slug: wp-photo-album-plus 📊 CVSS: 5.4/10 🛡️ CVE: CVE-2025-8726
    ⚠️ Affected Versions: ≥ * & ≤ 9.0.11.006
    ✅ Patched in: 9.0.11.007