VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

34,875 results Updated continuously

Records stay compact by default so the feed is easier to scan. Expand any advisory when you need remediation and full version coverage.

  • Plugin Medium Patched: Yes CVSS 5.4/10
    Quads Ads Manager for Google AdSense <= 2.0.98.1 - Authenticated (Contributor+) Stored Cross-Site Scripting via Multiple Ad Metadata Parameters

    The Quads Ads Manager for Google AdSense plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 2.0.98.1 due to insufficient input sanitization and output escaping of multiple ad metadata parameters. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Published
    Mar 27, 2026
    Affected Product
    Quads Ads Manager for Google AdSense
    Plugin · quick-adsense-reloaded
    Affected window
    Versions up to 2.0.98.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.99
    Recommended next step
    Update to 2.0.99
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.98.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.99
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.99, or a newer patched version

    Affected versions
    Versions up to 2.0.98.1
    Safe / patched versions
    2.0.99
  • Plugin Medium Patched: Yes CVSS 5.3/10
    Pagelayer <= 2.0.7 - Improper Neutralization of CRLF Sequences to Unauthenticated Email Header Injection via 'email'

    The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Improper Neutralization of CRLF Sequences ('CRLF Injection') in all versions up to, and including, 2.0.7. This is due to the contact form handler performing placeholder substitution on attacker-controlled form fields and then passing the resulting values into email headers without removing CR/LF characters. This makes it possible for unauthenticated attackers to inject arbitrary email headers (for example Bcc / Cc) and abuse form email delivery via the 'email' parameter granted they can target a contact form configured to use placeholders in mail template headers.

    Published
    Mar 27, 2026
    Affected Product
    Page Builder: Pagelayer – Drag and Drop website builder
    Plugin · pagelayer
    Affected window
    Versions up to 2.0.7
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.8
    Recommended next step
    Update to 2.0.8
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.8
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.8, or a newer patched version

    Affected versions
    Versions up to 2.0.7
    Safe / patched versions
    2.0.8
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Ninja Forms <= 3.14.1 - Authenticated (Contributor+) Sensitive Information Disclosure via Block Editor Token

    The Ninja Forms - The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.14.1 via a callback function for the admin_enqueue_scripts action handler in blocks/bootstrap.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to gain access to an authorization token to view form submissions for arbitrary forms, which could potentially contain sensitive information.

    Published
    Mar 27, 2026
    Affected Product
    Ninja Forms – The Contact Form Builder That Grows With You
    Plugin · ninja-forms
    Affected window
    Versions up to 3.14.1
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.14.2
    Recommended next step
    Update to 3.14.2
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.14.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.14.2
    Update to this version or a newer safe release.
    What to do

    Update to version 3.14.2, or a newer patched version

    Affected versions
    Versions up to 3.14.1
    Safe / patched versions
    3.14.2
  • Theme High Patched: Yes CVSS 7.2/10
    Oxygen <= 6.0.8 - Unauthenticated Server-Side Request Forgery via route_path

    The Oxygen Theme theme for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.0.8 via the laborator_calc_route AJAX action. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

    Published
    Mar 27, 2026
    Affected Product
    Oxygen - WooCommerce WordPress Theme
    Theme · oxygen
    Affected window
    Versions up to 6.0.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 6.0.9
    Recommended next step
    Update to 6.0.9
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 6.0.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    6.0.9
    Update to this version or a newer safe release.
    What to do

    Update to version 6.0.9, or a newer patched version

    Affected versions
    Versions up to 6.0.8
    Safe / patched versions
    6.0.9
  • Plugin High Patched: Yes CVSS 7.5/10
    SureForms <= 2.5.2 - Unauthenticated Payment Amount Validation Bypass via 'form_id'

    The SureForms – Contact Form, Payment Form & Other Custom Form Builder plugin for WordPress is vulnerable to Payment Amount Bypass in all versions up to, and including, 2.5.2. This is due to the create_payment_intent() function performing a payment validation solely based on the value of a user-controlled parameter. This makes it possible for unauthenticated attackers to bypass configured form payment-amount validation and create underpriced payment/subscription intents by setting form_id to 0.

    Published
    Mar 27, 2026
    Affected Product
    SureForms – Contact Form, Payment Form & Other Custom Form Builder
    Plugin · sureforms
    Affected window
    Versions up to 2.5.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.6.0
    Recommended next step
    Update to 2.6.0
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.5.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.6.0
    Update to this version or a newer safe release.
    What to do

    Update to version 2.6.0, or a newer patched version

    Affected versions
    Versions up to 2.5.2
    Safe / patched versions
    2.6.0
  • Plugin High Patched: Yes CVSS 8.0/10
    Ultimate Member <= 2.11.2 - Authenticated (Contributor+) Sensitive Information Exposure to Account Takeover via Shortcode Template Tag

    The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover.

    Published
    Mar 27, 2026
    Affected Product
    Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin
    Plugin · ultimate-member
    Affected window
    Versions up to 2.11.2
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.11.3
    Recommended next step
    Update to 2.11.3
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.11.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.11.3
    Update to this version or a newer safe release.
    What to do

    Update to version 2.11.3, or a newer patched version

    Affected versions
    Versions up to 2.11.2
    Safe / patched versions
    2.11.3
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Petitioner <= 0.7.3 - Missing Authorization

    The Petitioner plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 0.7.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform an unauthorized action.

    Published
    Mar 27, 2026
    Affected Product
    Petitioner
    Plugin · petitioner
    Affected window
    Versions up to 0.7.3
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 0.7.4
    Recommended next step
    Update to 0.7.4
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 0.7.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    0.7.4
    Update to this version or a newer safe release.
    What to do

    Update to version 0.7.4, or a newer patched version

    Affected versions
    Versions up to 0.7.3
    Safe / patched versions
    0.7.4
  • Theme High Patched: Yes CVSS 8.1/10
    Kiddy <= 2.0.8 - Unauthenticated Local File Inclusion

    The Kiddy theme for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.0.8. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other "safe" file types can be uploaded and included.

    Published
    Mar 27, 2026
    Affected Product
    Kiddy - Children WordPress theme
    Theme · kiddy
    Affected window
    Versions up to 2.0.8
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 2.0.9
    Recommended next step
    Update to 2.0.9
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 2.0.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.0.9
    Update to this version or a newer safe release.
    What to do

    Update to version 2.0.9, or a newer patched version

    Affected versions
    Versions up to 2.0.8
    Safe / patched versions
    2.0.9
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Smart Slider 3 <= 3.5.1.33 - Authenticated (Subscriber+) Arbitrary File Read via actionExportAll

    The Smart Slider 3 plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.5.1.33 via the 'actionExportAll' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information.

    Published
    Mar 26, 2026
    Affected Product
    Smart Slider 3
    Plugin · smart-slider-3
    Affected window
    Versions up to 3.5.1.33
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.5.1.34
    Recommended next step
    Update to 3.5.1.34
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.5.1.33
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.5.1.34
    Update to this version or a newer safe release.
    What to do

    Update to version 3.5.1.34, or a newer patched version

    Affected versions
    Versions up to 3.5.1.33
    Safe / patched versions
    3.5.1.34
  • Plugin Medium Patched: Yes CVSS 4.3/10
    Elementor Website Builder <= 3.35.7 - Incorrect Authorization to Authenticated (Contributor+) Sensitive Information Exposure via Elementor Template

    The Elementor Website Builder plugin for WordPress is vulnerable to Incorrect Authorization to Sensitive Information Exposure in all versions up to, and including, 3.35.7. This is due to a logic error in the is_allowed_to_read_template() function permission check that treats non-published templates as readable without verifying edit capabilities. This makes it possible for authenticated attackers, with contributor-level access and above, to read private or draft Elementor template content via the 'template_id' supplied to the 'get_template_data' action of the 'elementor_ajax' endpoint.

    Published
    Mar 25, 2026
    Affected Product
    Elementor Website Builder – More Than Just a Page Builder
    Plugin · elementor
    Affected window
    Versions up to 3.35.7
    Expand for exact coverage and remediation detail.
    Patch status
    Patched release available
    Fixed in 3.35.8
    Recommended next step
    Update to 3.35.8
    Move to a safe release and validate after update.
    Detailed remediation and version lists stay hidden until expanded.
    Affected if you're using
    Versions up to 3.35.7
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.35.8
    Update to this version or a newer safe release.
    What to do

    Update to version 3.35.8, or a newer patched version

    Affected versions
    Versions up to 3.35.7
    Safe / patched versions
    3.35.8
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

34,875 indexed records 14,303 tracked plugins 1,501 tracked themes
Security Guides

Start with the WordPress security topics already showing search demand.

Browse practical guides for WordPress security audit, WooCommerce security, hardening, brute force protection, monitoring, and incident response.

Browse Blog