VulnTitan Plugin

Scan WordPress with VulnTitan.

Free plugin for live checks. Pro adds scheduled scans, malware detection, integrity monitoring, alerts and guided remediation.

Free visibility. Pro automation. Download Free Upgrade to Pro
Live Database

Latest vulnerability records

Search by title, slug or version, then narrow the feed by asset type and severity.

34,721 results Updated continuously
  • Plugin Critical Patched: Yes CVSS 9.1/10
    WP DSGVO Tools (GDPR) <= 3.1.38 - Missing Authorization to Unauthenticated Account Destruction of Non-Admin Users

    The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for unauthenticated attackers to permanently destroy any non-administrator user account (password randomized, username/email overwritten, roles stripped, comments anonymized, sensitive usermeta wiped) by submitting the victim's email address with `process_now=1`. The nonce required for the request is publicly available on any page containing the `[unsubscribe_form]` shortcode.

    Published
    Mar 23, 2026
    Affected Product
    WP DSGVO Tools (GDPR)
    Plugin · shapepress-dsgvo
    Affected if you're using
    Versions up to 3.1.38
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.1.39
    Update to this version or a newer safe release.
    What to do

    Update to version 3.1.39, or a newer patched version

    Affected versions
    Versions up to 3.1.38
    Safe / patched versions
    3.1.39
  • Plugin High Patched: Yes CVSS 7.5/10
    JetEngine <= 3.8.6.1 - Unauthenticated SQL Injection via Listing Grid 'filtered_query' Parameter

    The JetEngine plugin for WordPress is vulnerable to SQL Injection via the `listing_load_more` AJAX action in all versions up to, and including, 3.8.6.1. This is due to the `filtered_query` parameter being excluded from the HMAC signature validation (allowing attacker-controlled input to bypass security checks) combined with the `prepare_where_clause()` method in the SQL Query Builder not sanitizing the `compare` operator before concatenating it into SQL statements. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database, provided the site has a JetEngine Listing Grid with Load More enabled that uses a SQL Query Builder query.

    Published
    Mar 23, 2026
    Affected Product
    JetEngine
    Plugin · jet-engine
    Affected if you're using
    Versions up to 3.8.6.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.8.6.2
    Update to this version or a newer safe release.
    What to do

    Update to version 3.8.6.2, or a newer patched version

    Affected versions
    Versions up to 3.8.6.1
    Safe / patched versions
    3.8.6.2
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Product Filter for WooCommerce by WBW <= 3.1.2 - Missing Authorization to Unauthenticated Filter Data Deletion via TRUNCATE TABLE

    The Product Filter for WooCommerce by WBW plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check in all versions up to, and including, 3.1.2. This is due to the plugin's MVC framework dynamically registering unauthenticated AJAX handlers via `wp_ajax_nopriv_` hooks without verifying user capabilities, combined with the base controller's `__call()` magic method forwarding undefined method calls to the model layer, and the `havePermissions()` method defaulting to `true` when no permissions are explicitly defined. This makes it possible for unauthenticated attackers to truncate the plugin's `wp_wpf_filters` database table via a crafted AJAX request with `action=delete`, permanently destroying all filter configurations.

    Published
    Mar 23, 2026
    Affected Product
    Product Filter for WooCommerce by WBW
    Plugin · woo-product-filter
    Affected if you're using
    Versions up to 3.1.2
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    3.1.3
    Update to this version or a newer safe release.
    What to do

    Update to version 3.1.3, or a newer patched version

    Affected versions
    Versions up to 3.1.2
    Safe / patched versions
    3.1.3
  • Plugin Medium Patched: Yes CVSS 6.5/10
    LearnDash LMS <= 5.0.3 - Authenticated (Contributor+) SQL Injection via 'filters[orderby_order]' Parameter

    The LearnDash LMS plugin for WordPress is vulnerable to blind time-based SQL Injection via the 'filters[orderby_order]' parameter in the 'learndash_propanel_template' AJAX action in all versions up to, and including, 5.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    Mar 23, 2026
    Affected Product
    LearnDash LMS
    Plugin · sfwd-lms
    Affected if you're using
    Versions up to 5.0.3
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.0.3.1
    Update to this version or a newer safe release.
    What to do

    Update to version 5.0.3.1, or a newer patched version

    Affected versions
    Versions up to 5.0.3
    Safe / patched versions
    5.0.3.1
  • Plugin Medium Patched: Yes CVSS 5.4/10
    User Registration & Membership <= 5.1.4 - Missing Authorization to Authenticated (Contributor+) Content Access Rule Manipulation

    The User Registration & Membership plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the Content Access Rules REST API endpoints in versions 5.0.1 through 5.1.4. This is due to the `check_permissions()` method only checking for `edit_posts` capability instead of an administrator-level capability. This makes it possible for authenticated attackers, with Contributor-level access and above, to list, create, modify, toggle, duplicate, and delete site-wide content restriction rules, potentially exposing restricted content or denying legitimate user access.

    Published
    Mar 23, 2026
    Affected Product
    User Registration & Membership – Free & Paid Memberships, Subscriptions, Content Restriction, User Profile, Custom User Registration & Login Builder
    Plugin · user-registration
    Affected if you're using
    Versions up to 5.1.4
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.1.5
    Update to this version or a newer safe release.
    What to do

    Update to version 5.1.5, or a newer patched version

    Affected versions
    Versions up to 5.1.4
    Safe / patched versions
    5.1.5
  • Plugin High Patched: Yes CVSS 8.1/10
    Contest Gallery <= 28.1.5 - Unauthenticated Privilege Escalation Admin Account Takeover via Registration Confirmation Email-to-ID Type Confusion

    The Contest Gallery plugin for WordPress is vulnerable to an authentication bypass leading to admin account takeover in all versions up to, and including, 28.1.5. This is due to the email confirmation handler in `users-registry-check-after-email-or-pin-confirmation.php` using the user's email string in a `WHERE ID = %s` clause instead of the numeric user ID, combined with an unauthenticated key-based login endpoint in `ajax-functions-frontend.php`. When the non-default `RegMailOptional=1` setting is enabled, an attacker can register with a crafted email starting with the target user ID (e.g., `1poc@example.test`), trigger the confirmation flow to overwrite the admin's `user_activation_key` via MySQL integer coercion, and then use the `post_cg1l_login_user_by_key` AJAX action to authenticate as the admin without any credentials. This makes it possible for unauthenticated attackers to take over any WordPress administrator account and gain full site control.

    Published
    Mar 23, 2026
    Affected Product
    Contest Gallery – Upload & Vote Photos, Media, Sell with PayPal & Stripe
    Plugin · contest-gallery
    Affected if you're using
    Versions up to 28.1.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    28.1.6
    Update to this version or a newer safe release.
    What to do

    Update to version 28.1.6, or a newer patched version

    Affected versions
    Versions up to 28.1.5
    Safe / patched versions
    28.1.6
  • Plugin Critical Patched: Yes CVSS 9.8/10
    Woocommerce Custom Product Addons Pro <= 5.4.1 - Unauthenticated Remote Code Execution via Custom Pricing Formula

    The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.4.1 via the custom pricing formula eval() in the process_custom_formula() function within includes/process/price.php. This is due to insufficient sanitization and validation of user-submitted field values before passing them to PHP's eval() function. The sanitize_values() method strips HTML tags but does not escape single quotes or prevent PHP code injection. This makes it possible for unauthenticated attackers to execute arbitrary code on the server by submitting a crafted value to a WCPA text field configured with custom pricing formula (pricingType: "custom" with {this.value}).

    Published
    Mar 23, 2026
    Affected Product
    Woocommerce Custom Product Addons Pro
    Plugin · woo-custom-product-addons-pro
    Affected if you're using
    Versions up to 5.4.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    5.4.2
    Update to this version or a newer safe release.
    What to do

    Update to version 5.4.2, or a newer patched version

    Affected versions
    Versions up to 5.4.1
    Safe / patched versions
    5.4.2
  • Plugin High Patched: Yes CVSS 8.8/10
    JupiterX Core <= 4.14.1 - Authenticated (Subscriber+) Missing Authorization To Limited File Upload via Popup Template Import

    The Jupiter X Core plugin for WordPress is vulnerable to limited file uploads due to missing authorization on import_popup_templates() function as well as insufficient file type validation in the upload_files() function in all versions up to, and including, 4.14.1. This makes it possible for Authenticated attackers with Subscriber-level access and above, to upload files with dangerous types that can lead to Remote Code Execution on servers configured to handle .phar files as executable PHP (e.g., Apache+mod_php), or Stored Cross-Site Scripting via .svg, .dfxp, or .xhtml files upload on any server configuration

    Published
    Mar 23, 2026
    Affected Product
    Jupiter X Core
    Plugin · jupiterx-core
    Affected if you're using
    Versions up to 4.14.1
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    4.14.2
    Update to this version or a newer safe release.
    What to do

    Update to version 4.14.2, or a newer patched version

    Affected versions
    Versions up to 4.14.1
    Safe / patched versions
    4.14.2
  • Plugin High Patched: Yes CVSS 7.5/10
    WP Job Portal <= 2.4.8 - Unauthenticated SQL Injection via 'radius' Parameter

    The WP Job Portal plugin for WordPress is vulnerable to SQL Injection via the 'radius' parameter in all versions up to, and including, 2.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    Mar 23, 2026
    Affected Product
    WP Job Portal – AI-Powered Recruitment System for Company or Job Board website
    Plugin · wp-job-portal
    Affected if you're using
    Versions up to 2.4.8
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    2.4.9
    Update to this version or a newer safe release.
    What to do

    Update to version 2.4.9, or a newer patched version

    Affected versions
    Versions up to 2.4.8
    Safe / patched versions
    2.4.9
  • Plugin Medium Patched: Yes CVSS 6.5/10
    Quiz and Survey Master (QSM) <= 10.3.5 - Authenticated (Contributor+) SQL Injection via 'merged_question' Parameter

    The Quiz and Survey Master (QSM) plugin for WordPress is vulnerable to SQL Injection via the 'merged_question' parameter in all versions up to, and including, 10.3.5. This is due to insufficient sanitization of user-supplied input before being used in a SQL query. The sanitize_text_field() function applied to the merged_question parameter does not prevent SQL metacharacters like ), OR, AND, and # from being included in the value, which is then directly concatenated into a SQL IN() clause without using $wpdb->prepare() or casting values to integers. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

    Published
    Mar 23, 2026
    Affected Product
    Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker
    Plugin · quiz-master-next
    Affected if you're using
    Versions up to 10.3.5
    Check the full report if you need exact branch-by-branch coverage.
    Patch available
    Yes
    A fixed release is listed for this issue.
    Fixed in
    11.0.0
    Update to this version or a newer safe release.
    What to do

    Update to version 11.0.0, or a newer patched version

    Affected versions
    Versions up to 10.3.5
    Safe / patched versions
    11.0.0
Coverage Hubs

Browse high-interest plugin and theme vulnerability hubs.

Use hub pages to review all indexed records for a single WordPress plugin or theme instead of scanning the global feed one advisory at a time.

34,721 indexed records 14,272 tracked plugins 1,481 tracked themes