VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

35,598 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 6.4/10
    ITERAS <= 1.8.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode Attributes

    The ITERAS plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple shortcodes (iteras-ordering, iteras-signup, iteras-paywall-login, iteras-selfservice) in all versions up to and including 1.8.2. This is due to insufficient input sanitization and output escaping in the combine_attributes() function. The function directly concatenates shortcode attribute values into JavaScript code within tags using double-quoted string interpolation (line 489: '"'.$key.'": "'.$value.'"') without any escaping. An attacker can break out of the JavaScript string context by including a double-quote character in a shortcode attribute value and inject arbitrary JavaScript. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Apr 23, 2026
    Affected Product
    ITERAS
    Plugin · iteras
    Affected window
    Versions up to 1.8.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.8.3
    Recommended next step
    Update to 1.8.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.8.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.8.3
    Update to this version or a newer safe release.
    What to do

    Update to version 1.8.3, or a newer patched version

    Affected versions
    Versions up to 1.8.2
    Safe / patched versions
    1.8.3
  • Plugin Medium Patched: Yes CVSS 4.3/10
    HubSpot All-In-One Marketing - Forms, Popups, Live Chat <= 11.3.32 - Missing Authorization to Authenticated (Contributor+) Installed Plugin Disclosure

    The HubSpot All-In-One Marketing - Forms, Popups, Live Chat plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 11.3.32 via the leadin/public/admin/class-adminconstants.php file. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract a list of all installed plugins and their versions which can be leveraged for reconnaissance and further attacks.

    Published
    Apr 23, 2026
    Affected Product
    HubSpot All-In-One Marketing – Forms, Popups, Live Chat
    Plugin · leadin
    Affected window
    Versions up to 11.3.32
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 11.3.33
    Recommended next step
    Update to 11.3.33
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 11.3.32
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    11.3.33
    Update to this version or a newer safe release.
    What to do

    Update to version 11.3.33, or a newer patched version

    Affected versions
    Versions up to 11.3.32
    Safe / patched versions
    11.3.33
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Liaison Site Prober <= 1.2.1 - Missing Authorization to Unauthenticated Information Exposure in '/logs' REST API Endpoint

    The Liaison Site Prober plugin for WordPress is vulnerable to Information Exposure in all versions up to and including 1.2.1 via the /wp-json/site-prober/v1/logs REST API endpoint. The permissions_read() permission callback unconditionally returns true (via __return_true()) instead of checking for appropriate capabilities. This makes it possible for unauthenticated attackers to retrieve sensitive audit log data including IP addresses, user IDs, usernames, login/logout events, failed login attempts, and detailed activity descriptions.

    Published
    Apr 23, 2026
    Affected Product
    Liaison Site Prober
    Plugin · liaison-site-prober
    Affected window
    Versions up to 1.2.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.2
    Recommended next step
    Update to 1.2.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.2
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.2, or a newer patched version

    Affected versions
    Versions up to 1.2.1
    Safe / patched versions
    1.2.2
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Taqnix <= 1.0.3 - Cross-Site Request Forgery to Account Deletion via 'taqnix_delete_my_account' AJAX Action

    The Taqnix plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.3. This is due to a missing nonce verification in the taqnix_delete_my_account() function, where the check_ajax_referer() call is explicitly commented out on line 883. This makes it possible for unauthenticated attackers to trick a logged-in non-administrator user into deleting their own account via a forged request granted they can trick the user into performing an action such as clicking a link or visiting a malicious page.

    Published
    Apr 23, 2026
    Affected Product
    Taqnix
    Plugin · taqnix
    Affected window
    Versions up to 1.0.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.0.4
    Recommended next step
    Update to 1.0.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.0.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.0.4
    Update to this version or a newer safe release.
    What to do

    Update to version 1.0.4, or a newer patched version

    Affected versions
    Versions up to 1.0.3
    Safe / patched versions
    1.0.4
  • Plugin Medium Patched: Yes CVSS 5.3/10
    WP Books Gallery <= 4.8.0 - Missing Authorization to Unauthenticated Settings Update via 'permalink_structure' Parameter

    The HM Books Gallery plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 4.8.0. This is due to the absence of capability checks and nonce verification in the admin_init hook that handles the permalink settings update at line 205-209 of wp-books-gallery.php. The vulnerable code checks only for the presence of the 'permalink_structure' POST parameter before updating the 'wbg_cpt_slug' option, without verifying that the request comes from an authenticated administrator. This makes it possible for unauthenticated attackers to modify the custom post type slug for the books gallery, which changes the URL structure for all book entries and can break existing links and SEO rankings.

    Published
    Apr 23, 2026
    Affected Product
    WP Books Gallery – Build Stunning Book Showcases & Libraries in Minutes
    Plugin · wp-books-gallery
    Affected window
    Versions up to 4.8.0
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.8.1
    Recommended next step
    Update to 4.8.1
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.8.0
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.8.1
    Update to this version or a newer safe release.
    What to do

    Update to version 4.8.1, or a newer patched version

    Affected versions
    Versions up to 4.8.0
    Safe / patched versions
    4.8.1
  • Plugin High Patched: Yes CVSS 8.1/10
    Drag and Drop File Upload for Contact Form 7 <= 1.1.3 - Unauthenticated Arbitrary File Upload via sanitize_file_name Bypass

    The Drag and Drop File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1.1.3. This is due to the plugin extracting the file extension before sanitization occurs and allowing the file type parameter to be controlled by the attacker rather than being restricted to administrator-configured values, which when combined with the fact that validation occurs on the unsanitized extension while the file is saved with a sanitized extension, allows special characters like '$' to be stripped during the save process. This makes it possible for unauthenticated attackers to upload arbitrary PHP files and potentially achieve remote code execution, however, an .htaccess file and name randomization is in place which restricts real-world exploitability.

    Published
    Apr 23, 2026
    Affected Product
    Drag and Drop File Upload for Contact Form 7
    Plugin · drag-and-drop-file-upload-for-contact-form-7
    Affected window
    Versions up to 1.1.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.1.4
    Recommended next step
    Update to 1.1.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.1.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.1.4
    Update to this version or a newer safe release.
    What to do

    Update to version 1.1.4, or a newer patched version

    Affected versions
    Versions up to 1.1.3
    Safe / patched versions
    1.1.4
  • Plugin Medium Patched: Yes CVSS 6.4/10
    Royal Addons for Elementor <= 1.7.1056 - Authenticated (Author+) Stored Cross-Site Scripting via Image Caption Field

    The Royal Elementor Addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image captions in the Image Grid/Slider/Carousel widget in versions up to and including 1.7.1056. This is due to insufficient output escaping in the render_post_thumbnail() function, where wp_kses_post() is used instead of esc_attr() for the alt attribute context. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses a page with the malicious image displayed in the media grid widget.

    Published
    Apr 23, 2026
    Affected Product
    Royal Addons for Elementor – Addons and Templates Kit for Elementor
    Plugin · royal-elementor-addons
    Affected window
    Versions up to 1.7.1056
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.7.1057
    Recommended next step
    Update to 1.7.1057
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.7.1056
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.7.1057
    Update to this version or a newer safe release.
    What to do

    Update to version 1.7.1057, or a newer patched version

    Affected versions
    Versions up to 1.7.1056
    Safe / patched versions
    1.7.1057
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Booking Calendar Contact Form <= 1.2.63 - Authenticated (Subscriber+) Insecure Direct Object Reference to Calendar Takeover

    The Booking Calendar Contact Form plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.2.63 via the dex_bccf_admin_int_calendar_list.inc.php file due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to takeover other user's calendars and view user data associated with the calendar.

    Published
    Apr 23, 2026
    Affected Product
    Booking Calendar Contact Form
    Plugin · booking-calendar-contact-form
    Affected window
    Versions up to 1.2.63
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 1.2.64
    Recommended next step
    Update to 1.2.64
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 1.2.63
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    1.2.64
    Update to this version or a newer safe release.
    What to do

    Update to version 1.2.64, or a newer patched version

    Affected versions
    Versions up to 1.2.63
    Safe / patched versions
    1.2.64
  • Plugin Medium Patched: Yes CVSS 5.3/10
    ExactMetrics <= 9.1.2 - Authenticated (Subscriber+) Missing Authorization to Google Ads Access Token Retrieval via AJAX Action 'exactmetrics_ads_get_token'

    The ExactMetrics – Google Analytics Dashboard for WordPress plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 9.1.2. This is due to missing capability checks in the get_ads_access_token() and reset_experience() AJAX handlers. While the mi-admin-nonce is localized on all admin pages (including profile.php which subscribers can access), and while other similar AJAX endpoints in the same class properly check for the exactmetrics_save_settings capability, these two endpoints only verify the nonce. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve valid Google Ads access tokens and reset Google Ads integration settings.

    Published
    Apr 23, 2026
    Affected Product
    ExactMetrics – Google Analytics Dashboard for WordPress (Website Stats Plugin)
    Plugin · google-analytics-dashboard-for-wp
    Affected window
    Versions up to 9.1.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 9.1.3
    Recommended next step
    Update to 9.1.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 9.1.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    9.1.3
    Update to this version or a newer safe release.
    What to do

    Update to version 9.1.3, or a newer patched version

    Affected versions
    Versions up to 9.1.2
    Safe / patched versions
    9.1.3
  • Plugin Medium Patched: Yes CVSS 4.3/10
    BetterDocs <= 4.3.11 - Missing Authorization to Authenticated (Subscriber+) Unauthorized AI API Usage

    The BetterDocs plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 4.3.11. This is due to a missing capability check in the generate_openai_content_callback() function, which relies solely on a nonce rather than verifying user permissions. This makes it possible for authenticated attackers, with subscriber-level access and above, to trigger OpenAI API calls using the site's configured API key with arbitrary user-controlled prompts, leading to unauthorized consumption of the site owner's paid AI API quota.

    Published
    Apr 23, 2026
    Affected Product
    BetterDocs – Knowledge Base Docs & FAQ Solution for Elementor & Block Editor
    Plugin · betterdocs
    Affected window
    Versions up to 4.3.11
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 4.3.12
    Recommended next step
    Update to 4.3.12
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 4.3.11
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.3.12
    Update to this version or a newer safe release.
    What to do

    Update to version 4.3.12, or a newer patched version

    Affected versions
    Versions up to 4.3.11
    Safe / patched versions
    4.3.12
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

35,598 indexed records 14,444 tracked plugins 1,570 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog